It was discovered that a buffer overflow in the ENTTEC dissector may lead to the execution of arbitrary code. For the stable distribution (lenny), this problem has been fixed in version 1.0.2-3+lenny12. For the testing distribution (squeeze), this problem has been fixed in version 1.2.11-6. For the unstable distribution (sid), this problem has been fixed in version 1.2.11-6. We recommend that you upgrade your wireshark packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
It was discovered that a buffer overflow in the ENTTEC dissector may lead to the execution of arbitrary code.
For the stable distribution (lenny), this problem has been fixed in version 1.0.2-3+lenny12.
For the testing distribution (squeeze), this problem has been fixed in version 1.2.11-6.
For the unstable distribution (sid), this problem has been fixed in version 1.2.11-6.
We recommend that you upgrade your wireshark packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/