Wireshark Multiple Vulnerabilities-01 Dec 2012 (Mac OS X)

Summary
This host is installed with Wireshark and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to denial of service or to consume excessive CPU resources. Impact Level: Application
Solution
Upgrade to the Wireshark version 1.4.15, 1.6.10 or 1.8.2 or later, For updates refer to http://www.wireshark.org/download
Insight
The flaws are due to - A division by zero error within the DCP ETSI dissector, an error within the STUN dissector and EtherCAT Mailbox dissector can be exploited to cause a crash. - An error within the RTPS2 dissector can be exploited to cause a buffer overflow. - An error within the STUN dissector can be exploited to cause a crash. - An error within the CIP dissector can be exploited to exhaust memory. - An error within the CTDB dissector, AFP dissector and XTP dissector can be exploited to trigger an infinite loop and consume excessive CPU resources.
Affected
Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10 and 1.8.x before 1.8.2 on Mac OS X
References