Wireshark Denial of Service and Buffer Overflow Vulnerabilities (Windows)

Summary
The host is installed with Wireshark and is prone to Denial of Service and buffer overflow vulnerabilities.
Impact
Successful exploitation could allow attackers to overflow a buffer and execute arbitrary code on the system or cause the application to crash. Impact Level: Application
Solution
Upgrade to the Wireshark version 1.4.5 or later, For updates refer to http://www.wireshark.org/download.html
Insight
The flaws are due to: - a buffer overflow error in the 'DECT' dissector when processing malformed data, which could allow code execution via malformed packets or a malicious PCAP file. - an error in the 'NFS' dissector when processing malformed data, which could be exploited to crash an affected application.
Affected
Wireshark version 1.4.0 through 1.4.4
References