VID |
28298 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The installed version of Wireshark is 1.2.x less than 1.2.16 or 1.4.x less than 1.4.5. Such versions are affected by the following vulnerabilities :
- A data type mismatch error exists in the function 'dissect_nfs_clientaddr4' in the file 'packet-nfs.c' of the NFS dissector and could lead to application crashes while decoding 'SETCLIENTID' calls. (5209) - A use-after-free error exists in the file 'asn1/x509if/x509if.cnf' of the X.509if dissector that could lead to application crashes. (5754, 5793) - An buffer overflow vulnerability exists in the file 'packet-dect.c' of the DECT dissector that could allow arbitrary code execution. (5836)
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5209 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5754 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5793 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5836 http://www.wireshark.org/security/wnpa-sec-2011-05.html http://www.wireshark.org/security/wnpa-sec-2011-06.html http://www.wireshark.org/docs/relnotes/wireshark-1.2.16.html http://www.wireshark.org/docs/relnotes/wireshark-1.4.5.html
* Platforms Affected: Wireshark versions prior to 1.2.16 / 1.4.5 Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version Wireshark (1.2.16/1.4.5 or later), available from the Wireshark.org Web site at http://www.wireshark.org/download.html |
Related URL |
CVE-2011-1590,CVE-2011-1591,CVE-2011-1592 (CVE) |
Related URL |
47392 (SecurityFocus) |
Related URL |
(ISS) |
|