-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                         ESB-2008.0076 -- [RedHat]
                    Moderate: wireshark security update
                              22 January 2008

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Publisher:            Red Hat
Operating System:     Red Hat Linux 5
                      Red Hat Linux 4
                      Red Hat Linux 3
Impact:               Execute Arbitrary Code/Commands
Access:               Remote/Unauthenticated
CVE Names:            CVE-2007-6451 CVE-2007-6450 CVE-2007-6441
                      CVE-2007-6439 CVE-2007-6438 CVE-2007-6121
                      CVE-2007-6120 CVE-2007-6119 CVE-2007-6118
                      CVE-2007-6117 CVE-2007-6116 CVE-2007-6115
                      CVE-2007-6114 CVE-2007-6113 CVE-2007-6112
                      CVE-2007-6111

Ref:                  ESB-2008.0003
                      ESB-2007.1040
                      ESB-2007.0954

Original Bulletin:    https://rhn.redhat.com/errata/RHSA-2008-0058.html
                      https://rhn.redhat.com/errata/RHSA-2008-0059.html

Comment: This ESB contains two (2) seperate Red Hat advisories covering
         three (3) versions.
         

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: wireshark security update
Advisory ID:       RHSA-2008:0058-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2008-0058.html
Issue date:        2008-01-21
CVE Names:         CVE-2007-6111 CVE-2007-6112 CVE-2007-6113 
                   CVE-2007-6114 CVE-2007-6115 CVE-2007-6116 
                   CVE-2007-6117 CVE-2007-6118 CVE-2007-6119 
                   CVE-2007-6120 CVE-2007-6121 CVE-2007-6438 
                   CVE-2007-6439 CVE-2007-6441 CVE-2007-6450 
                   CVE-2007-6451 
=====================================================================

1. Summary:

Updated wireshark packages that fix several security issues are now
available for Red Hat Enterprise Linux 4 and 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

3. Description:

Wireshark is a program for monitoring network traffic. Wireshark was
previously known as Ethereal.

Several flaws were found in Wireshark. Wireshark could crash or possibly
execute arbitrary code as the user running Wireshark if it read a malformed
packet off the network. (CVE-2007-6112, CVE-2007-6114, CVE-2007-6115,
CVE-2007-6117)

Several denial of service bugs were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off the network.
(CVE-2007-6111, CVE-2007-6113, CVE-2007-6116, CVE-2007-6118, CVE-2007-6119,
CVE-2007-6120, CVE-2007-6121, CVE-2007-6438, CVE-2007-6439, CVE-2007-6441,
CVE-2007-6450, CVE-2007-6451)

As well, Wireshark switched from using net-snmp to libsmi, which is
included in this errata.

Users of wireshark should upgrade to these updated packages, which contain
Wireshark version 0.99.7, and resolve these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bugs fixed (http://bugzilla.redhat.com/):

397251 - CVE-2007-6111 wireshark mp3 and ncp flaws
397271 - CVE-2007-6112 wireshark ppp flaws
397281 - CVE-2007-6113 wireshark DNP3 flaws
397291 - CVE-2007-6114 wireshark SSL and OS/400 trace flaws
397311 - CVE-2007-6115 wireshark ANSI MAP flaws
397321 - CVE-2007-6116 wireshark firebird/interbase flaws
397331 - CVE-2007-6117 wireshark HTTP dissector flaws
397341 - CVE-2007-6118 wireshark MEGACO dissector flaws
397351 - CVE-2007-6119 wireshark DCP ETSI dissector flaws
397361 - CVE-2007-6120 wireshark Bluetooth SDP dissector flaws
397371 - CVE-2007-6121 wireshark RPC Portmap flaws
426335 - Please consider adding libsmi to distro
426336 - Please consider adding libsmi to distro
427249 - CVE-2007-6438 wireshark SMB dissector crash
427251 - CVE-2007-6439 wireshark IPv6 and USB dissector crash
427252 - CVE-2007-6441 wireshark WiMAX dissector possible crash
427253 - CVE-2007-6450 wireshark RPL dissector crash
427254 - CVE-2007-6451 wireshark CIP dissector crash

6. Package List:

Red Hat Enterprise Linux AS version 4:

Source:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/libsmi-0.4.5-2.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/wireshark-0.99.7-1.el4.src.rpm

i386:
libsmi-0.4.5-2.el4.i386.rpm
libsmi-debuginfo-0.4.5-2.el4.i386.rpm
libsmi-devel-0.4.5-2.el4.i386.rpm
wireshark-0.99.7-1.el4.i386.rpm
wireshark-debuginfo-0.99.7-1.el4.i386.rpm
wireshark-gnome-0.99.7-1.el4.i386.rpm

ia64:
libsmi-0.4.5-2.el4.ia64.rpm
libsmi-debuginfo-0.4.5-2.el4.ia64.rpm
libsmi-devel-0.4.5-2.el4.ia64.rpm
wireshark-0.99.7-1.el4.ia64.rpm
wireshark-debuginfo-0.99.7-1.el4.ia64.rpm
wireshark-gnome-0.99.7-1.el4.ia64.rpm

ppc:
libsmi-0.4.5-2.el4.ppc.rpm
libsmi-debuginfo-0.4.5-2.el4.ppc.rpm
libsmi-devel-0.4.5-2.el4.ppc.rpm
wireshark-0.99.7-1.el4.ppc.rpm
wireshark-debuginfo-0.99.7-1.el4.ppc.rpm
wireshark-gnome-0.99.7-1.el4.ppc.rpm

s390:
libsmi-0.4.5-2.el4.s390.rpm
libsmi-debuginfo-0.4.5-2.el4.s390.rpm
libsmi-devel-0.4.5-2.el4.s390.rpm
wireshark-0.99.7-1.el4.s390.rpm
wireshark-debuginfo-0.99.7-1.el4.s390.rpm
wireshark-gnome-0.99.7-1.el4.s390.rpm

s390x:
libsmi-0.4.5-2.el4.s390x.rpm
libsmi-debuginfo-0.4.5-2.el4.s390x.rpm
libsmi-devel-0.4.5-2.el4.s390x.rpm
wireshark-0.99.7-1.el4.s390x.rpm
wireshark-debuginfo-0.99.7-1.el4.s390x.rpm
wireshark-gnome-0.99.7-1.el4.s390x.rpm

x86_64:
libsmi-0.4.5-2.el4.x86_64.rpm
libsmi-debuginfo-0.4.5-2.el4.x86_64.rpm
libsmi-devel-0.4.5-2.el4.x86_64.rpm
wireshark-0.99.7-1.el4.x86_64.rpm
wireshark-debuginfo-0.99.7-1.el4.x86_64.rpm
wireshark-gnome-0.99.7-1.el4.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

Source:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/libsmi-0.4.5-2.el4.src.rpm
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/wireshark-0.99.7-1.el4.src.rpm

i386:
libsmi-0.4.5-2.el4.i386.rpm
libsmi-debuginfo-0.4.5-2.el4.i386.rpm
libsmi-devel-0.4.5-2.el4.i386.rpm
wireshark-0.99.7-1.el4.i386.rpm
wireshark-debuginfo-0.99.7-1.el4.i386.rpm
wireshark-gnome-0.99.7-1.el4.i386.rpm

x86_64:
libsmi-0.4.5-2.el4.x86_64.rpm
libsmi-debuginfo-0.4.5-2.el4.x86_64.rpm
libsmi-devel-0.4.5-2.el4.x86_64.rpm
wireshark-0.99.7-1.el4.x86_64.rpm
wireshark-debuginfo-0.99.7-1.el4.x86_64.rpm
wireshark-gnome-0.99.7-1.el4.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

Source:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/libsmi-0.4.5-2.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/wireshark-0.99.7-1.el4.src.rpm

i386:
libsmi-0.4.5-2.el4.i386.rpm
libsmi-debuginfo-0.4.5-2.el4.i386.rpm
libsmi-devel-0.4.5-2.el4.i386.rpm
wireshark-0.99.7-1.el4.i386.rpm
wireshark-debuginfo-0.99.7-1.el4.i386.rpm
wireshark-gnome-0.99.7-1.el4.i386.rpm

ia64:
libsmi-0.4.5-2.el4.ia64.rpm
libsmi-debuginfo-0.4.5-2.el4.ia64.rpm
libsmi-devel-0.4.5-2.el4.ia64.rpm
wireshark-0.99.7-1.el4.ia64.rpm
wireshark-debuginfo-0.99.7-1.el4.ia64.rpm
wireshark-gnome-0.99.7-1.el4.ia64.rpm

x86_64:
libsmi-0.4.5-2.el4.x86_64.rpm
libsmi-debuginfo-0.4.5-2.el4.x86_64.rpm
libsmi-devel-0.4.5-2.el4.x86_64.rpm
wireshark-0.99.7-1.el4.x86_64.rpm
wireshark-debuginfo-0.99.7-1.el4.x86_64.rpm
wireshark-gnome-0.99.7-1.el4.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

Source:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/libsmi-0.4.5-2.el4.src.rpm
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/wireshark-0.99.7-1.el4.src.rpm

i386:
libsmi-0.4.5-2.el4.i386.rpm
libsmi-debuginfo-0.4.5-2.el4.i386.rpm
libsmi-devel-0.4.5-2.el4.i386.rpm
wireshark-0.99.7-1.el4.i386.rpm
wireshark-debuginfo-0.99.7-1.el4.i386.rpm
wireshark-gnome-0.99.7-1.el4.i386.rpm

ia64:
libsmi-0.4.5-2.el4.ia64.rpm
libsmi-debuginfo-0.4.5-2.el4.ia64.rpm
libsmi-devel-0.4.5-2.el4.ia64.rpm
wireshark-0.99.7-1.el4.ia64.rpm
wireshark-debuginfo-0.99.7-1.el4.ia64.rpm
wireshark-gnome-0.99.7-1.el4.ia64.rpm

x86_64:
libsmi-0.4.5-2.el4.x86_64.rpm
libsmi-debuginfo-0.4.5-2.el4.x86_64.rpm
libsmi-devel-0.4.5-2.el4.x86_64.rpm
wireshark-0.99.7-1.el4.x86_64.rpm
wireshark-debuginfo-0.99.7-1.el4.x86_64.rpm
wireshark-gnome-0.99.7-1.el4.x86_64.rpm

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/libsmi-0.4.5-2.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/wireshark-0.99.7-1.el5.src.rpm

i386:
libsmi-0.4.5-2.el5.i386.rpm
libsmi-debuginfo-0.4.5-2.el5.i386.rpm
libsmi-devel-0.4.5-2.el5.i386.rpm
wireshark-0.99.7-1.el5.i386.rpm
wireshark-debuginfo-0.99.7-1.el5.i386.rpm

x86_64:
libsmi-0.4.5-2.el5.x86_64.rpm
libsmi-debuginfo-0.4.5-2.el5.x86_64.rpm
libsmi-devel-0.4.5-2.el5.x86_64.rpm
wireshark-0.99.7-1.el5.x86_64.rpm
wireshark-debuginfo-0.99.7-1.el5.x86_64.rpm

RHEL Desktop Workstation (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/wireshark-0.99.7-1.el5.src.rpm

i386:
wireshark-debuginfo-0.99.7-1.el5.i386.rpm
wireshark-gnome-0.99.7-1.el5.i386.rpm

x86_64:
wireshark-debuginfo-0.99.7-1.el5.x86_64.rpm
wireshark-gnome-0.99.7-1.el5.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/libsmi-0.4.5-2.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/wireshark-0.99.7-1.el5.src.rpm

i386:
libsmi-0.4.5-2.el5.i386.rpm
libsmi-debuginfo-0.4.5-2.el5.i386.rpm
libsmi-devel-0.4.5-2.el5.i386.rpm
wireshark-0.99.7-1.el5.i386.rpm
wireshark-debuginfo-0.99.7-1.el5.i386.rpm
wireshark-gnome-0.99.7-1.el5.i386.rpm

ia64:
libsmi-0.4.5-2.el5.ia64.rpm
libsmi-debuginfo-0.4.5-2.el5.ia64.rpm
libsmi-devel-0.4.5-2.el5.ia64.rpm
wireshark-0.99.7-1.el5.ia64.rpm
wireshark-debuginfo-0.99.7-1.el5.ia64.rpm
wireshark-gnome-0.99.7-1.el5.ia64.rpm

ppc:
libsmi-0.4.5-2.el5.ppc.rpm
libsmi-debuginfo-0.4.5-2.el5.ppc.rpm
libsmi-devel-0.4.5-2.el5.ppc.rpm
wireshark-0.99.7-1.el5.ppc.rpm
wireshark-debuginfo-0.99.7-1.el5.ppc.rpm
wireshark-gnome-0.99.7-1.el5.ppc.rpm

s390x:
libsmi-0.4.5-2.el5.s390x.rpm
libsmi-debuginfo-0.4.5-2.el5.s390x.rpm
libsmi-devel-0.4.5-2.el5.s390x.rpm
wireshark-0.99.7-1.el5.s390x.rpm
wireshark-debuginfo-0.99.7-1.el5.s390x.rpm
wireshark-gnome-0.99.7-1.el5.s390x.rpm

x86_64:
libsmi-0.4.5-2.el5.x86_64.rpm
libsmi-debuginfo-0.4.5-2.el5.x86_64.rpm
libsmi-devel-0.4.5-2.el5.x86_64.rpm
wireshark-0.99.7-1.el5.x86_64.rpm
wireshark-debuginfo-0.99.7-1.el5.x86_64.rpm
wireshark-gnome-0.99.7-1.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6111
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6116
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6119
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6438
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6439
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6441
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451
http://www.wireshark.org/docs/relnotes/wireshark-0.99.7.html
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2008 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFHlFyHXlSAg2UNWIIRAl6cAJ9goJMOzjUYq3kS2BO9ftiFuOxr8ACfbUp5
JAlIjaqCaaJLpTan06LiyE4=
=vovz
- -----END PGP SIGNATURE-----


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: wireshark security update
Advisory ID:       RHSA-2008:0059-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2008-0059.html
Issue date:        2008-01-21
CVE Names:         CVE-2007-3389 CVE-2007-3390 CVE-2007-3391 
                   CVE-2007-3392 CVE-2007-3393 CVE-2007-6113 
                   CVE-2007-6114 CVE-2007-6115 CVE-2007-6117 
                   CVE-2007-6118 CVE-2007-6120 CVE-2007-6121 
                   CVE-2007-6450 CVE-2007-6451 
=====================================================================

1. Summary:

Updated wireshark packages that fix several security issues are now
available for Red Hat Enterprise Linux 3.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Description:

Wireshark is a program for monitoring network traffic. Wireshark was
previously known as Ethereal.

Several flaws were found in Wireshark. Wireshark could crash or possibly
execute arbitrary code as the user running Wireshark if it read a malformed
packet off the network. (CVE-2007-6114, CVE-2007-6115, CVE-2007-6117)

Several denial of service bugs were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off the network.
(CVE-2007-3389, CVE-2007-3390, CVE-2007-3391, CVE-2007-3392, CVE-2007-3392,
CVE-2007-3393, CVE-2007-6113, CVE-2007-6118, CVE-2007-6120, CVE-2007-6121,
CVE-2007-6450, CVE-2007-6451)

As well, Wireshark switched from using net-snmp to libsmi, which is
included in this errata.

Users of wireshark should upgrade to these updated packages, which contain
Wireshark version 0.99.7, and resolve these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bugs fixed (http://bugzilla.redhat.com/):

245796 - CVE-2007-3389 Wireshark crashes when inspecting HTTP traffic
245797 - CVE-2007-3391 Wireshark loops infinitely when inspecting DCP ETSI traffic
245798 - CVE-2007-3392 Wireshark loops infinitely when inspecting SSL traffic
246221 - CVE-2007-3393 Wireshark corrupts the stack when inspecting BOOTP traffic
246225 - CVE-2007-3390 Wireshark crashes when inspecting iSeries traffic
246229 - CVE-2007-3392 Wireshark crashes when inspecting MMS traffic
397281 - CVE-2007-6113 wireshark DNP3 flaws
397291 - CVE-2007-6114 wireshark SSL and OS/400 trace flaws
397311 - CVE-2007-6115 wireshark ANSI MAP flaws
397331 - CVE-2007-6117 wireshark HTTP dissector flaws
397341 - CVE-2007-6118 wireshark MEGACO dissector flaws
397361 - CVE-2007-6120 wireshark Bluetooth SDP dissector flaws
397371 - CVE-2007-6121 wireshark RPC Portmap flaws
426337 - Wireshare rebase requires new libsmi package adding to rhel3
427253 - CVE-2007-6450 wireshark RPL dissector crash
427254 - CVE-2007-6451 wireshark CIP dissector crash

6. Package List:

Red Hat Enterprise Linux AS version 3:

Source:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/libsmi-0.4.5-3.el3.src.rpm
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/wireshark-0.99.7-EL3.1.src.rpm

i386:
libsmi-0.4.5-3.el3.i386.rpm
libsmi-debuginfo-0.4.5-3.el3.i386.rpm
libsmi-devel-0.4.5-3.el3.i386.rpm
wireshark-0.99.7-EL3.1.i386.rpm
wireshark-debuginfo-0.99.7-EL3.1.i386.rpm
wireshark-gnome-0.99.7-EL3.1.i386.rpm

ia64:
libsmi-0.4.5-3.el3.ia64.rpm
libsmi-debuginfo-0.4.5-3.el3.ia64.rpm
libsmi-devel-0.4.5-3.el3.ia64.rpm
wireshark-0.99.7-EL3.1.ia64.rpm
wireshark-debuginfo-0.99.7-EL3.1.ia64.rpm
wireshark-gnome-0.99.7-EL3.1.ia64.rpm

ppc:
libsmi-0.4.5-3.el3.ppc.rpm
libsmi-debuginfo-0.4.5-3.el3.ppc.rpm
libsmi-devel-0.4.5-3.el3.ppc.rpm
wireshark-0.99.7-EL3.1.ppc.rpm
wireshark-debuginfo-0.99.7-EL3.1.ppc.rpm
wireshark-gnome-0.99.7-EL3.1.ppc.rpm

s390:
libsmi-0.4.5-3.el3.s390.rpm
libsmi-debuginfo-0.4.5-3.el3.s390.rpm
libsmi-devel-0.4.5-3.el3.s390.rpm
wireshark-0.99.7-EL3.1.s390.rpm
wireshark-debuginfo-0.99.7-EL3.1.s390.rpm
wireshark-gnome-0.99.7-EL3.1.s390.rpm

s390x:
libsmi-0.4.5-3.el3.s390x.rpm
libsmi-debuginfo-0.4.5-3.el3.s390x.rpm
libsmi-devel-0.4.5-3.el3.s390x.rpm
wireshark-0.99.7-EL3.1.s390x.rpm
wireshark-debuginfo-0.99.7-EL3.1.s390x.rpm
wireshark-gnome-0.99.7-EL3.1.s390x.rpm

x86_64:
libsmi-0.4.5-3.el3.x86_64.rpm
libsmi-debuginfo-0.4.5-3.el3.x86_64.rpm
libsmi-devel-0.4.5-3.el3.x86_64.rpm
wireshark-0.99.7-EL3.1.x86_64.rpm
wireshark-debuginfo-0.99.7-EL3.1.x86_64.rpm
wireshark-gnome-0.99.7-EL3.1.x86_64.rpm

Red Hat Desktop version 3:

Source:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/libsmi-0.4.5-3.el3.src.rpm
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/wireshark-0.99.7-EL3.1.src.rpm

i386:
libsmi-0.4.5-3.el3.i386.rpm
libsmi-debuginfo-0.4.5-3.el3.i386.rpm
libsmi-devel-0.4.5-3.el3.i386.rpm
wireshark-0.99.7-EL3.1.i386.rpm
wireshark-debuginfo-0.99.7-EL3.1.i386.rpm
wireshark-gnome-0.99.7-EL3.1.i386.rpm

x86_64:
libsmi-0.4.5-3.el3.x86_64.rpm
libsmi-debuginfo-0.4.5-3.el3.x86_64.rpm
libsmi-devel-0.4.5-3.el3.x86_64.rpm
wireshark-0.99.7-EL3.1.x86_64.rpm
wireshark-debuginfo-0.99.7-EL3.1.x86_64.rpm
wireshark-gnome-0.99.7-EL3.1.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

Source:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/libsmi-0.4.5-3.el3.src.rpm
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/wireshark-0.99.7-EL3.1.src.rpm

i386:
libsmi-0.4.5-3.el3.i386.rpm
libsmi-debuginfo-0.4.5-3.el3.i386.rpm
libsmi-devel-0.4.5-3.el3.i386.rpm
wireshark-0.99.7-EL3.1.i386.rpm
wireshark-debuginfo-0.99.7-EL3.1.i386.rpm
wireshark-gnome-0.99.7-EL3.1.i386.rpm

ia64:
libsmi-0.4.5-3.el3.ia64.rpm
libsmi-debuginfo-0.4.5-3.el3.ia64.rpm
libsmi-devel-0.4.5-3.el3.ia64.rpm
wireshark-0.99.7-EL3.1.ia64.rpm
wireshark-debuginfo-0.99.7-EL3.1.ia64.rpm
wireshark-gnome-0.99.7-EL3.1.ia64.rpm

x86_64:
libsmi-0.4.5-3.el3.x86_64.rpm
libsmi-debuginfo-0.4.5-3.el3.x86_64.rpm
libsmi-devel-0.4.5-3.el3.x86_64.rpm
wireshark-0.99.7-EL3.1.x86_64.rpm
wireshark-debuginfo-0.99.7-EL3.1.x86_64.rpm
wireshark-gnome-0.99.7-EL3.1.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

Source:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/libsmi-0.4.5-3.el3.src.rpm
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/wireshark-0.99.7-EL3.1.src.rpm

i386:
libsmi-0.4.5-3.el3.i386.rpm
libsmi-debuginfo-0.4.5-3.el3.i386.rpm
libsmi-devel-0.4.5-3.el3.i386.rpm
wireshark-0.99.7-EL3.1.i386.rpm
wireshark-debuginfo-0.99.7-EL3.1.i386.rpm
wireshark-gnome-0.99.7-EL3.1.i386.rpm

ia64:
libsmi-0.4.5-3.el3.ia64.rpm
libsmi-debuginfo-0.4.5-3.el3.ia64.rpm
libsmi-devel-0.4.5-3.el3.ia64.rpm
wireshark-0.99.7-EL3.1.ia64.rpm
wireshark-debuginfo-0.99.7-EL3.1.ia64.rpm
wireshark-gnome-0.99.7-EL3.1.ia64.rpm

x86_64:
libsmi-0.4.5-3.el3.x86_64.rpm
libsmi-debuginfo-0.4.5-3.el3.x86_64.rpm
libsmi-devel-0.4.5-3.el3.x86_64.rpm
wireshark-0.99.7-EL3.1.x86_64.rpm
wireshark-debuginfo-0.99.7-EL3.1.x86_64.rpm
wireshark-gnome-0.99.7-EL3.1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3390
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3391
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3393
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451
http://www.wireshark.org/docs/relnotes/wireshark-0.99.7.html
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2008 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFHlGdXXlSAg2UNWIIRAkDUAKCBpR3dJYe6U39tZViXyHXeq9dsmwCfZTdk
jI/URTMF2Yhq/Q2Z0xbZ2Oc=
=ucIE
- -----END PGP SIGNATURE-----


- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBR5U8Yyh9+71yA2DNAQJI5wP/TZU3QrDVnXjDZwjEppPMTW9ZZYK+gj4d
IkSHGKEvqZFmNoHS+9dc99QdA1+n1S2p32ldPuiL4vyeBJkoiYVCJZKMzBqaVuq0
VrOP4ZDRDt932hlwa7aJd+n3NWpjmjE70a8Zj2J8Ig+z46VrYogFsSwWbSSTBkXT
9+oHUS1BTkY=
=8YYg
-----END PGP SIGNATURE-----