![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5-F3H8hPQKUXoRstqQL_geqhyphenhyphenQ69TnU0p0TpEIOUj-WLU6_Zu6DsQGU1Z6cG9aCfZ7g8XJgKw_13j0rgWY368dpx5Ks0l0Dk552jLX0n1c5j6eew-5KCV-mLwCNzdABdqVu2ncKG4ZLg/s1600/wireshark.png)
Wireshark Team have released versions 1.8.1 and 1.6.9 to close important vulnerabilities in their open source network protocol analyser.
The vulnerabilities are a problem in the Point-to-Point Protocol (PPP) dissector that leads to a crash and a bug in the Network File System (NFS) dissector that could result in excessive consumption of CPU resources; to take advantage of the holes, an attacker must inject a malformed packet onto the wire or convince a victim to read a malformed packet trace file.
Versions 1.4.0 to 1.4.13, 1.6.0 to 1.6.8 and 1.8.0 are affected; Users are advised to upgrade to 1.6.9 and 1.8.1 to fix the problem.
Wireshark 1.6.9 and 1.8.1 are available to download