VID |
50053 |
Severity |
30 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The installed version of Wireshark 1.6 is earlier than 1.6.16. It is, therefore, affected by the following vulnerabilities :
- Errors exist in the CAPWAP and DCP ETSI dissectors that could allow them to crash. (Bugs 8717, 8725) - Errors exist in the HTTP dissector that could overrun the stack, which could result in an application crash. (Bug 8733)
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.wireshark.org/security/wnpa-sec-2013-32.html http://www.wireshark.org/security/wnpa-sec-2013-39.html http://www.wireshark.org/security/wnpa-sec-2013-41.html http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html
* Platforms Affected: Wireshark versions 1.6.x before 1.6.16 Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version Wireshark (1.6.16 or later), available from the Wireshark.org Web site at http://www.wireshark.org/download/win32/all-versions/ |
Related URL |
CVE-2013-4074,CVE-2013-4081,CVE-2013-4083 (CVE) |
Related URL |
60448,60500,60504,60505 (SecurityFocus) |
Related URL |
(ISS) |
|