Multiple vulnerabilities in Wireshark allow for the remote execution of arbitrary code, or a Denial of Service condition.
|Package||net-analyzer/wireshark on all architectures|
|Affected versions||< 1.4.9|
|Unaffected versions||>= 1.4.9|
Wireshark is a versatile network protocol analyzer.
Multiple vulnerabilities have been discovered in Wireshark. Please review the CVE identifiers referenced below for details.
A remote attacker could send specially crafted packets on a network being monitored by Wireshark, entice a user to open a malformed packet trace file using Wireshark, or deploy a specially crafted Lua script for use by Wireshark, possibly resulting in the execution of arbitrary code, or a Denial of Service condition.
There is no known workaround at this time.
All Wireshark users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.4.9"