Package name wireshark
Date November 2nd, 2006
Advisory ID MDKSA-2006:195
Affected versions 2006.0, 2007.0, CS4.0
Synopsis Updated wireshark packages fix multiple vulnerabilities

Problem Description

Vulnerabilities in the HTTP, LDAP, XOT, WBXML, and MIME Multipart
dissectors were discovered in versions of wireshark less than 0.99.4,
as well as various other bugs.

This updated provides wireshark 0.99.4 which is not vulnerable to these
issues.

Updated Packages

Mandriva Linux 2006

 6d9200ceb28c080700a14c5082d06144  2006.0/i586/libwireshark0-0.99.4-0.1.20060mdk.i586.rpm
 846bf319dbf28977697f0360e6c9c3bf  2006.0/i586/tshark-0.99.4-0.1.20060mdk.i586.rpm
 cf4c6ad8bcc4e8f1d0f30747e43629a0  2006.0/i586/wireshark-0.99.4-0.1.20060mdk.i586.rpm
 7c298b8216d885c501698333a351a6df  2006.0/i586/wireshark-tools-0.99.4-0.1.20060mdk.i586.rpm 
 da584fd84e4eaa96134eae8bb6b2ccd9  2006.0/SRPMS/wireshark-0.99.4-0.1.20060mdk.src.rpm

Mandriva Linux 2006/X86_64

 5cc25cf7a14362017b627804a23415ce  2006.0/x86_64/lib64wireshark0-0.99.4-0.1.20060mdk.x86_64.rpm
 a30498851a759f07b8cebcdebb0f906b  2006.0/x86_64/tshark-0.99.4-0.1.20060mdk.x86_64.rpm
 cafef7ec7d7df699ca288ae03ed37c67  2006.0/x86_64/wireshark-0.99.4-0.1.20060mdk.x86_64.rpm
 f84e2b12d83f53f0032992ead38cacff  2006.0/x86_64/wireshark-tools-0.99.4-0.1.20060mdk.x86_64.rpm 
 da584fd84e4eaa96134eae8bb6b2ccd9  2006.0/SRPMS/wireshark-0.99.4-0.1.20060mdk.src.rpm

Mandriva Linux 2007

 3d1f3895ce1a440d94768fed10657cc6  2007.0/i586/libwireshark0-0.99.4-0.1mdv2007.0.i586.rpm
 ef44905cba00cfb7ba5d72e4d45b4dee  2007.0/i586/tshark-0.99.4-0.1mdv2007.0.i586.rpm
 21ef07d16228990f81952e6a9d0d4c02  2007.0/i586/wireshark-0.99.4-0.1mdv2007.0.i586.rpm
 60cf791c1bdb8819e69da5a31381fbf7  2007.0/i586/wireshark-tools-0.99.4-0.1mdv2007.0.i586.rpm 
 7205c72932f614d8b4bcc7ac214a3cd5  2007.0/SRPMS/wireshark-0.99.4-0.1mdv2007.0.src.rpm

Mandriva Linux 2007/X86_64

 3c0c94604f22665270ecfd5ea4ef63b8  2007.0/x86_64/lib64wireshark0-0.99.4-0.1mdv2007.0.x86_64.rpm
 2f50e6bdb122c99a8ccfe265bd5e9871  2007.0/x86_64/tshark-0.99.4-0.1mdv2007.0.x86_64.rpm
 d6b35a2cc4871b09e65c97d438d8e5aa  2007.0/x86_64/wireshark-0.99.4-0.1mdv2007.0.x86_64.rpm
 8dbd4f0e7cb7165e0877fead9b767aa8  2007.0/x86_64/wireshark-tools-0.99.4-0.1mdv2007.0.x86_64.rpm 
 7205c72932f614d8b4bcc7ac214a3cd5  2007.0/SRPMS/wireshark-0.99.4-0.1mdv2007.0.src.rpm

Corporate Server 4.0

 cf6d82d53a965a367b37ddce468eb5e1  corporate/4.0/i586/libwireshark0-0.99.4-0.1.20060mlcs4.i586.rpm
 4fd35ab3805a08b8010832759b6520ca  corporate/4.0/i586/tshark-0.99.4-0.1.20060mlcs4.i586.rpm
 5ceb4d06dcec263ca472b1a0cebacb6e  corporate/4.0/i586/wireshark-0.99.4-0.1.20060mlcs4.i586.rpm
 254f405e87704d0a3bff60730af347cd  corporate/4.0/i586/wireshark-tools-0.99.4-0.1.20060mlcs4.i586.rpm 
 063c6e14b5bbcc81f4a26fd183d9c53c  corporate/4.0/SRPMS/wireshark-0.99.4-0.1.20060mlcs4.src.rpm

Corporate Server 4.0/X86_64

 66a696916ebf9665d62d0fe7363ac742  corporate/4.0/x86_64/lib64wireshark0-0.99.4-0.1.20060mlcs4.x86_64.rpm
 1662228d5a03d68af75cd6a93654fb81  corporate/4.0/x86_64/tshark-0.99.4-0.1.20060mlcs4.x86_64.rpm
 e4be92066710fb02ad806ebb154006be  corporate/4.0/x86_64/wireshark-0.99.4-0.1.20060mlcs4.x86_64.rpm
 2066c3a5738e8e3ade6fa4afab2adfed  corporate/4.0/x86_64/wireshark-tools-0.99.4-0.1.20060mlcs4.x86_64.rpm 
 063c6e14b5bbcc81f4a26fd183d9c53c  corporate/4.0/SRPMS/wireshark-0.99.4-0.1.20060mlcs4.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4574
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4805
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5468
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5469
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5740
http://www.wireshark.org/security/wnpa-sec-2006-03.html

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.