| VID |
50092 |
| Severity |
30 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The version of Wireshark installed on the remote Windows host is 2.0.x prior to 2.0.3. It is, therefore, affected by multiple denial of service vulnerabilities in the following components :
- GSM CBCH dissector - IAX2 dissector - IEEE 802.11 dissector - MS-WSP dissector - NCP dissector - PKTC dissector - TShark
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://www.wireshark.org/docs/relnotes/wireshark-2.0.3.html
* Platforms Affected: Wireshark versions 2.0.x prior to 2.0.3 Microsoft Windows Any version |
| Recommendation |
Upgrade to the latest version Wireshark (2.0.3 or later), available from the Wireshark.org Web site at http://www.wireshark.org/download/win32/all-versions/ |
| Related URL |
CVE-2016-4006,CVE-2016-4076,CVE-2016-4077,CVE-2016-4078,CVE-2016-4079,CVE-2016-4080,CVE-2016-4081,CVE-2016-4082,CVE-2016-4083,CVE-2016-4084 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|