Wireshark Multiple Vulnerabilities - April 12 (Windows)

Summary
This host is installed with Wireshark and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code or cause a denial of service. Impact Level: Application
Solution
Upgrade to the Wireshark version 1.4.11, 1.6.5 or later, For updates refer to http://www.wireshark.org/download
Insight
The flaws are due to - NULL pointer dereference errors when reading certain packet information can be exploited to cause a crash. - An error within the RLC dissector can be exploited to cause a buffer overflow via a specially crafted RLC packet capture file. - An error within the 'lanalyzer_read()' function (wiretap/lanalyzer.c) when parsing LANalyzer files can be exploited to cause a heap-based buffer underflow.
Affected
Wireshark versions 1.4.x before 1.4.11 and 1.6.x before 1.6.5 on Windows
References