A heap-based buffer overflow was found in the DECT dissector of wireshark versions 1.4.0 to 1.4.4 A remote attacker could use this flaw to cause wireshark executable to crash or, potentially, execute arbitrary code with the privileges of the user running wireshark. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5838 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5836 Upstream acknowledges Paul Makowski of SEI/CERT as the original reporter of the issue.
Created wireshark tracking bugs for this issue Affects: fedora-all [bug 697747]
This issue was addressed in Fedora 14 and Fedora 15 via: https://admin.fedoraproject.org/updates/wireshark-1.4.6-1.fc14 https://admin.fedoraproject.org/updates/wireshark-1.4.6-1.fc15 Statement: Not vulnerable. This issue did not affect the versions of wireshark as shipped with Red Hat Enterprise Linux 4, 5, or 6.