Wireshark (formerly Ethereal) 0.8.16 to 0.99.6 allows remote attackers to cause a denial of service (crash) via a malformed RPC Portmap packet.
bugs.gentoo.org/show_bug.cgi?id=199958
lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html
secunia.com/advisories/27777
secunia.com/advisories/27817
secunia.com/advisories/28197
secunia.com/advisories/28207
secunia.com/advisories/28288
secunia.com/advisories/28304
secunia.com/advisories/28325
secunia.com/advisories/28564
secunia.com/advisories/28583
secunia.com/advisories/29048
security.gentoo.org/glsa/glsa-200712-23.xml
securitytracker.com/id?1018988
wiki.rpath.com/wiki/Advisories:rPSA-2008-0004
www.debian.org/security/2007/dsa-1414
www.mandriva.com/security/advisories?name=MDVSA-2008:001
www.mandriva.com/security/advisories?name=MDVSA-2008:1
www.redhat.com/support/errata/RHSA-2008-0058.html
www.redhat.com/support/errata/RHSA-2008-0059.html
www.securityfocus.com/archive/1/485792/100/0/threaded
www.securityfocus.com/bid/26532
www.vupen.com/english/advisories/2007/3956
www.wireshark.org/security/wnpa-sec-2007-03.html
issues.rpath.com/browse/RPL-1975
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11374
www.redhat.com/archives/fedora-package-announce/2007-December/msg00606.html
www.redhat.com/archives/fedora-package-announce/2007-December/msg00712.html