File _patchinfo of Package patchinfo.import5278

<patchinfo incident="wireshark" version="5278">
  <issue tracker="bnc" id="718032" />
  <issue tracker="bnc" id="697516" />
  <issue tracker="bnc" id="706728" />
  <issue tracker="CVE" id="CVE-2011-3266" />
  <issue tracker="CVE" id="CVE-2011-3360" />
  <issue tracker="CVE" id="CVE-2011-3483" />
  <issue tracker="CVE" id="CVE-2011-2597" />
  <issue tracker="CVE" id="CVE-2011-2698" />
  <issue tracker="CVE" id="CVE-2011-1957" />
  <issue tracker="CVE" id="CVE-2011-1959" />
  <issue tracker="CVE" id="CVE-2011-2174" />
  <issue tracker="CVE" id="CVE-2011-2175" />
  <issue tracker="CVE" id="CVE-2011-1958" />
  <category>security</category>
  <rating>low</rating>
  <summary>wireshark 1.6.2 security update fixing multiple issues</summary>
  <description>This update of wireshark fixes the following
vulnerabilities:

- CVE-2011-3266: Wireshark IKE dissector vulnerability
- CVE-2011-3360: Wireshark Lua script execution
  vulnerability
- CVE-2011-3483: Wireshark buffer exception handling
  vulnerability     
- CVE-2011-2597: Lucent/Ascend file parser susceptible to
  infinite loop
- CVE-2011-2698: ANSI MAP dissector susceptible to infinite
  loop     
- CVE-2011-1957: Large/infinite loop in the DICOM dissector
- CVE-2011-1959: A corrupted snoop file could crash
  Wireshark
- CVE-2011-2174: Malformed compressed capture data could
  crash Wireshark
- CVE-2011-2175: A corrupted Visual Networks file could
  crash Wireshark
- CVE-2011-1958: dereferene a NULL pointer if we had a
  corrupted Diameter dictionary
</description>
  <packager>adrianSuSE</packager>
</patchinfo>