A Use-after-free flaw causing a heap-based buffer overflow was found in the X.509if dissector of Wireshark 1.2.0 to 1.2.15 and 1.4.0 to 1.4.4. A remote attacker could use this flaw to cause wireshark executable to crash or, potentially, execute arbitrary code with the privileges of the user running wireshark. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5754 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5793 Patch: http://anonsvn.wireshark.org/viewvc?revision=36608&view=revision
Created wireshark tracking bugs for this issue Affects: fedora-all [bug 697747]
This issue was addressed in Fedora 14 and Fedora 15 via: https://admin.fedoraproject.org/updates/wireshark-1.4.6-1.fc14 https://admin.fedoraproject.org/updates/wireshark-1.4.6-1.fc15
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:0509 https://rhn.redhat.com/errata/RHSA-2012-0509.html
Statement: This issue does not affect the version of wireshark package as shipped with Red Hat Enterprise Linux 4 and 5. This issue was fixed in Red Hat Enterprise Linux 6 via RHSA-2012:0509.