Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of
service (application crash) via a malformed capture file that leads to an
invalid root tvbuff, related to a "buffer exception handling vulnerability."
The csnStreamDissector function in epan/dissectors/packet-csn1.c in the
CSN.1 dissector in Wireshark 1.6.x before 1.6.2 does not initialize a
certain structure member, which allows remote attackers to cause a denial of
service (application crash) via a malformed packet.
Off-by-one error in the elem_cell_id_aux function in
epan/dissectors/packet-ansi_a.c in the ANSI MAP dissector in Wireshark 1.4.x
before 1.4.8 and 1.6.x before 1.6.1 allows remote attackers to cause a
denial of service (infinite loop) via an invalid packet.
The issues in this bug are already resolved in stable, please remove vulnerable versions.
vulnerable versions were dropped.
This issue was resolved and addressed in
GLSA 201110-02 at http://security.gentoo.org/glsa/glsa-201110-02.xml
by GLSA coordinator Alex Legler (a3li).