VID |
50021 |
Severity |
30 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The installed version of Wireshark is 1.6.x less than 1.6.9 Such versions are affected by the following vulnerabilities :
- An error exists in the 'PPP' dissector that can cause the application to crash when reading a malformed packet from either the wire or from a capture file. (CVE-2012-4048) - An error exists in the 'NFS' dissector that can cause the application to consume excessive CPU resources when reading a malformed packet from either the wire or from a capture file. (CVE-2012-4049)
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680056 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7436 http://www.wireshark.org/security/wnpa-sec-2012-11.html http://www.wireshark.org/security/wnpa-sec-2012-12.html http://www.wireshark.org/docs/relnotes/wireshark-1.6.9.html
* Platforms Affected: Wireshark versions 1.6.x before 1.6.9 Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version Wireshark (1.6.9 or later), available from the Wireshark.org Web site at http://www.wireshark.org/download.html |
Related URL |
CVE-2012-4048,CVE-2012-4049 (CVE) |
Related URL |
54649 (SecurityFocus) |
Related URL |
(ISS) |
|