Korean
<< Back
VID 28246
Severity 30
Port 139,445
Protocol TCP
Class SMB
Detailed Description A version of Wireshark which is older than 1.2.2 has been installed on the host. Wireshark is a free packet analyzer computer application. Wireshark versions prior to 1.2.2 are vulnerable to multiple vulnerabilities.

- The GSM A RR dissector could crash. (Bug 3893)

- The OpcUa dissector could use excessive CPU and memory. (Bug 3986)

- The TLS dissector could crash on some platforms. (Bug 4008)

These vulnerabilities could result in a denial of service. A remote attacker could exploit these issues by tricking a user into opening a maliciously crafted capture file. Additionally, if Wireshark is running in promiscuous mode, one of these issues could be exploited remotely (from the same network segment).

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3893
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3986
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4008
http://www.wireshark.org/security/wnpa-sec-2009-06.html

* Platforms Affected:
Wireshark versions prior to 1.2.2 (from 0.99.6 to 1.2.1)
Microsoft Windows Any version
Recommendation Upgrade to the latest version Wireshark (1.2.2 or later), available from the Wireshark.org Web site at http://www.wireshark.org/download.html
Related URL CVE-2009-3241,CVE-2009-3242,CVE-2009-3243 (CVE)
Related URL 36408 (SecurityFocus)
Related URL (ISS)