Wireshark (formerly known as Ethereal) is vulnerable to several security issues, potentially allowing the execution of arbitrary code by a remote attacker.
Package | net-analyzer/wireshark on all architectures |
---|---|
Affected versions | < 0.99.2 |
Unaffected versions | >= 0.99.2 |
Package | net-analyzer/ethereal on all architectures |
---|---|
Affected versions | <= 0.99.0-r1 |
Unaffected versions |
Wireshark, formerly known as Ethereal, is a popular network protocol analyzer.
Wireshark dissectors have been found vulnerable to a large number of exploits, including off-by-one errors, buffer overflows, format string overflows and an infinite loop.
Running an affected version of Wireshark or Ethereal could allow for a remote attacker to execute arbitrary code on the user's computer by sending specially crafted packets.
There is no known workaround at this time.
All Wireshark users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.2"
All Ethereal users should migrate to Wireshark:
# emerge --sync # emerge --ask --unmerge net-analyzer/ethereal # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.2"
To keep the [saved] configuration from Ethereal and reuse it with Wireshark:
# mv ~/.ethereal ~/.wireshark
Release date
July 25, 2006
Latest revision
July 25, 2006: 01
Severity
high
Exploitable
remote
Bugzilla entries