Wireshark Multiple Vulnerabilities (Mac OS X)

Summary
This host is installed with Wireshark and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code or cause a denial of service. Impact Level: Application
Solution
Upgrade to the Wireshark version 1.4.11, 1.6.5 or later, For updates refer to http://www.wireshark.org/download
Insight
The flaws are due to - NULL pointer dereference errors when reading certain packet information can be exploited to cause a crash. - An error within the RLC dissector can be exploited to cause a buffer overflow via a specially crafted RLC packet capture file. - An error within the 'lanalyzer_read()' function (wiretap/lanalyzer.c) when parsing LANalyzer files can be exploited to cause a heap-based buffer underflow.
Affected
Wireshark versions 1.4.x before 1.4.11 and 1.6.x before 1.6.5 on Mac OS X
References