It may be possible to make Wireshark exit prematurely by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. Affects 1.4.0 to 1.4.14, 1.6.0 to 1.6.9, 1.8.0 to 1.8.1 and is fixed in upstream 1.8.2, 1.6.10, and 1.4.15 versions. http://www.wireshark.org/security/wnpa-sec-2012-22.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7562 http://anonsvn.wireshark.org/viewvc?view=revision&revision=43149
Created wireshark tracking bugs for this issue Affects: fedora-all [bug 848593]
Statement: Not Vulnerable. This issue does not affect the version of wireshark as shipped with Red Hat Enterprise Linux 5 and 6.
wireshark-1.6.10-1.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
wireshark-1.6.10-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.