Wireshark: Multiple vulnerabilities Wireshark (formerly known as Ethereal) is vulnerable to several security issues, potentially allowing the execution of arbitrary code by a remote attacker. wireshark ethereal 2006-07-25 2006-07-25 140856 remote 0.99.2 0.99.2 0.99.0-r1

Wireshark, formerly known as Ethereal, is a popular network protocol analyzer.

Wireshark dissectors have been found vulnerable to a large number of exploits, including off-by-one errors, buffer overflows, format string overflows and an infinite loop.

Running an affected version of Wireshark or Ethereal could allow for a remote attacker to execute arbitrary code on the user's computer by sending specially crafted packets.

There is no known workaround at this time.

All Wireshark users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.2"

All Ethereal users should migrate to Wireshark:

# emerge --sync # emerge --ask --unmerge net-analyzer/ethereal # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.2"

To keep the [saved] configuration from Ethereal and reuse it with Wireshark:

# mv ~/.ethereal ~/.wireshark
Wireshark wnpa-sec-2006-01 CVE-2006-3627 CVE-2006-3628 CVE-2006-3629 CVE-2006-3630 CVE-2006-3631 CVE-2006-3632 koon dizzutch jaervosz