VID |
50044 |
Severity |
30 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The installed version of Wireshark 1.8 is earlier than 1.8.3. It thus is affected by the following vulnerabilities :
- A malformed packet can cause the 'DRDA' and 'HSRP' dissectors to enter an infinite loop, thereby consuming excessive CPU resources. (CVE-2012-3548, CVE-2012-5237)
- A malformed packet can cause the 'PPP' dissector to crash the application. (CVE-2012-5238)
- A malformed packet can trigger a buffer overflow in the 'LDP' dissector, which results in an application crash. (CVE-2012-5240)
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.wireshark.org/security/wnpa-sec-2012-31.html http://www.wireshark.org/security/wnpa-sec-2012-26.html http://www.wireshark.org/security/wnpa-sec-2012-27.html http://www.wireshark.org/security/wnpa-sec-2012-28.html http://www.wireshark.org/security/wnpa-sec-2012-29.html http://www.wireshark.org/docs/relnotes/wireshark-1.8.3.html
* Platforms Affected: Wireshark versions 1.8.x before 1.8.3 Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version Wireshark (1.8.3 or later), available from the Wireshark.org Web site at http://www.wireshark.org/download/win32/all-versions/ |
Related URL |
CVE-2012-3548,CVE-2012-5237,CVE-2012-5238,CVE-2012-5240 (CVE) |
Related URL |
55284,55754 (SecurityFocus) |
Related URL |
(ISS) |
|