

The first vulnerability is tagged as low urgency, while the second is tagged as medium urgency.Īs we have already mentioned, Canonical has already fixed the problems, so protecting ourselves is as simple as opening our software updater and installing the new versions of:įor the changes to take effect, it is recommended to restart the operating system.Welcome to the Chocolatey Community Package Repository! The packages found in this section of the site are provided, maintained, and moderated by the community. A remote or local user could cause Wireshark to crash by injecting malformed packets into the network or by convincing someone to read a malformed packet trace file.

The fixed vulnerabilities, with the same description, are:

Ubuntu 14.04 and Ubuntu 12.04 still enjoy ESM support, but the version released in 2012 is not compatible with the latest versions of this technology. Yes Ubuntu 14.04 is affected, so they should soon publish in report USN-4133-2 with the updated information for Trusty Tahr. The version that will be released in just one month (31 days), that is, Ubuntu 19.10 is not affected. Wireshark vulnerabilities exist in all versions that have the software installed The bugs are present in the three Ubuntu versions that still enjoy official support, which are Ubuntu 19.04 Disco Dingo, Ubuntu 18.04 Bionic Beaver, and Ubuntu 16.04 Xenial Xerus. It's about the report USN-4133-1 and describes two flaws in Wireshark that could be used to crash the software if it received network traffic or specially crafted input files. Likely because of the user base, Canonical has labeled one of the two recently fixed vulnerabilities as medium urgency.Īs we are used to, the company directed by Mark Shuttleworth has published the safety report after having fixed both vulnerabilities. So and how we explain at the beginning of the year, Wireshark is the most important and most used free network protocol analyzer in the world and is used for the solution and analysis of networks and to be able to capture and view the data of a network with the possibility of being able to read the contents of the captured packets.
