VID |
28246 |
Severity |
30 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
A version of Wireshark which is older than 1.2.2 has been installed on the host. Wireshark is a free packet analyzer computer application. Wireshark versions prior to 1.2.2 are vulnerable to multiple vulnerabilities.
- The GSM A RR dissector could crash. (Bug 3893)
- The OpcUa dissector could use excessive CPU and memory. (Bug 3986)
- The TLS dissector could crash on some platforms. (Bug 4008)
These vulnerabilities could result in a denial of service. A remote attacker could exploit these issues by tricking a user into opening a maliciously crafted capture file. Additionally, if Wireshark is running in promiscuous mode, one of these issues could be exploited remotely (from the same network segment).
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3893 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3986 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4008 http://www.wireshark.org/security/wnpa-sec-2009-06.html
* Platforms Affected: Wireshark versions prior to 1.2.2 (from 0.99.6 to 1.2.1) Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version Wireshark (1.2.2 or later), available from the Wireshark.org Web site at http://www.wireshark.org/download.html |
Related URL |
CVE-2009-3241,CVE-2009-3242,CVE-2009-3243 (CVE) |
Related URL |
36408 (SecurityFocus) |
Related URL |
(ISS) |
|