Summary
The remote host is missing updates announced in
advisory GLSA 201110-02.
Solution
All Wireshark users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-analyzer/wireshark-1.4.9'
http://www.securityspace.com/smysecure/catid.html?in=GLSA%20201110-02 http://bugs.gentoo.org/show_bug.cgi?id=323859
http://bugs.gentoo.org/show_bug.cgi?id=330479
http://bugs.gentoo.org/show_bug.cgi?id=339401
http://bugs.gentoo.org/show_bug.cgi?id=346191
http://bugs.gentoo.org/show_bug.cgi?id=350551
http://bugs.gentoo.org/show_bug.cgi?id=354197
http://bugs.gentoo.org/show_bug.cgi?id=357237
http://bugs.gentoo.org/show_bug.cgi?id=363895
http://bugs.gentoo.org/show_bug.cgi?id=369683
http://bugs.gentoo.org/show_bug.cgi?id=373961
http://bugs.gentoo.org/show_bug.cgi?id=381551
http://bugs.gentoo.org/show_bug.cgi?id=383823
http://bugs.gentoo.org/show_bug.cgi?id=386179
Insight
Multiple vulnerabilities in Wireshark allow for the remote execution of arbitrary code, or a Denial of Service condition.
Severity
Classification
-
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities