-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.0844
                         wireshark security update
                               18 June 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           wireshark
Publisher:         Debian
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
                   Debian GNU/Linux 7
Impact/Access:     Denial of Service               -- Remote/Unauthenticated
                   Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-4083 CVE-2013-4082 CVE-2013-4081
                   CVE-2013-4078 CVE-2013-4077 CVE-2013-4076
                   CVE-2013-4075 CVE-2013-4074 

Original Bulletin: 
   http://www.debian.org/security/2013/dsa-2709

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running wireshark check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2709-1                   security@debian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
June 17, 2013                          http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : wireshark
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2013-4074 CVE-2013-4075 CVE-2013-4076 CVE-2013-4077 
                 CVE-2013-4078 CVE-2013-4081 CVE-2013-4082 CVE-2013-4083

Multiple vulnerabilities were discovered in the dissectors for CAPWAP, 
GMR-1 BCCH, PPP, NBAP, RDP, HTTP, DCP ETSI and in the Ixia IxVeriWave 
file parser, which could result in denial of service or the execution of 
arbitrary code.

For the stable distribution (wheezy), these problems have been fixed in
version 1.8.2-5wheezy4.

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your wireshark packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlG/PDcACgkQXm3vHE4uylpbFACfUo3vfb+t9jrvuaRSuplNL12N
vE8AoOL5VT4XRAWZKQgfzX3ECcU07NiP
=fjQs
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Kd/c
-----END PGP SIGNATURE-----