rPath Security Advisory: 2006-0202-1 Published: 2006-11-01 Products: rPath Linux 1 Rating: Minor Exposure Level Classification: Remote Deterministic Denial of Service Updated Versions: wireshark=/conary.rpath.com@rpl:devel//1/0.99.4-0.1-1 tshark=/conary.rpath.com@rpl:devel//1/0.99.4-0.1-1 References: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4574 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4805 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5468 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5469 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5740 https://issues.rpath.com/browse/RPL-746 Description: In previous versions of the wireshark and tshark packages, and all versions of the ethereal and tethereal packages, are vulnerable to several remote Denial of Service attacks which can cause the application to crash. None of these vulnerabilities is currently believed to enable remote unauthorized access. The fixes are available only as part of the wireshark package. Development of the ethereal program has ceased under the ethereal name and continued under the wireshark name, due to restrictions on the use of the "ethereal" trademark. The latest version of the ethereal and tethereal packages in rPath Linux 1 are now redirects to the wireshark and tshark packages. The command "conary update ethereal tethereal" will cause the ethereal and tethereal packages on the system to be replaced by wireshark and tshark, respectively. The "conary updateall" command will also appropriately migrate the system from ethereal to wireshark.