-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.1961
                         wireshark security update
                              15 August 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           wireshark
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-6511 CVE-2016-6510 CVE-2016-6509
                   CVE-2016-6508 CVE-2016-6507 CVE-2016-6506
                   CVE-2016-6505 CVE-2016-6504 

Reference:         ESB-2016.1838.2

Original Bulletin: 
   http://www.debian.org/security/2016/dsa-3648

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3648-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
August 12, 2016                       https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : wireshark
CVE ID         : CVE-2016-6504 CVE-2016-6505 CVE-2016-6506 CVE-2016-6507 
                 CVE-2016-6508 CVE-2016-6509 CVE-2016-6510 CVE-2016-6511

Multiple vulnerabilities were discovered in the dissectors for NDS,
PacketBB, WSP, MMSE, RLC, LDSS, RLC and OpenFlow, which could result in
denial of service or the execution of arbitrary code.

For the stable distribution (jessie), these problems have been fixed in
version 1.12.1+g01b65bf-4+deb8u8.

For the testing distribution (stretch), these problems have been fixed
in version 2.0.5+ga3be9c6-1.

For the unstable distribution (sid), these problems have been fixed in
version 2.0.5+ga3be9c6-1.

We recommend that you upgrade your wireshark packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBAgAGBQJXriWXAAoJEBDCk7bDfE42vn0QAKQSyQoWuCxhCJuS4iASaeef
OCT1ai3/s8LG4yEZBKC6oSbsgKU7uqJO3cmb7U5x3BDmcdow3h7PYeTBlHf5rvpK
d0/HIN1Q/NMrkf1BQKJckqgNhDMzrgHonpyhi/Yidjgu+/CrUgMYeZhm563cn3Ni
yUvNdKQZ42yowEd6uhVNUifn4Pg1/h+x6LuPjvtiggcbEGLHnXzdmtoqwh27AhP0
Up3e+QO8N7P9/mCnB27Sm5whQXlNYem/zsIMsk0KVzXsEz7cBOm+GtrI4VsSlAc3
RtGSTkdAwAGi5i1l7fk3RAvOpLDy2KfgxxBR3fTv9KHgEu1EPpoFPIUdLgoEESlT
bs2B+zmNmOfktPjfh7r5JCeaWa+A0l07tP6CyYDqq4xP4IhiqShuGXz+/twoYMlg
NucTs04UlZVW3cayjGtiGc+8mnkdBohclrkaQjwyhv8ltnxGHfHoZHGNF7smOiVV
n3Qnzsg3iFsM4Pr5YPqUzWUmh7PMulOCY68KVgIOi/RoFKyActyNX3yG5bg8gdcJ
Bqi3J3UJWZ7fDxnuSX0vayuVq7O/2AxX+PiHsYfhi7XjWYz3R1sxny2TVZp4zKjF
YUKECkcL6cTbAt+keOaFl5gVAOElCPzBOgIJRVgx2TeJIkr3/baYrsfjnNFvNRNf
2UHuDtNdMlkdSfYKxlyD
=hOTx
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=b8i9
-----END PGP SIGNATURE-----