VID |
50097 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The version of Wireshark installed on the remote Windows host is 2.0.x prior to 2.0.5. It is, therefore, affected by multiple denial of service vulnerabilities :
- A denial of service vulnerability exists in the CORBA IDL dissector due to improper handling of packets. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause an application crash. Note that this vulnerability only affects 64-bit versions of Windows. (CVE-2016-6503)
- A denial of service vulnerability exists due to a divide-by-zero flaw in the dissect_pbb_tlvblock() function in packet-packetbb.c. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause an application crash. (CVE-2016-6505)
- A flaw exists in the add_headers() function in packet_wsp.c that is triggered when an offset of zero is returned by the wkh_content_disposition() function. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause an infinite loop, resulting in a denial of service condition. (CVE-2016-6506)
- A denial of service vulnerability exists due to an incorrect integer data type used in the rlc_decode_li() function in packet-rlc.c. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a long loop and excessive CPU resource consumption, resulting in a denial of service condition. (CVE-2016-6508)
- A denial of service vulnerability exists in the dissect_ldss_transfer() function in packet-ldss.c that is triggered when recreating a conversation that already exists. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause an application crash. (CVE-2016-6509)
- An overflow condition exists in the rlc_decode_li() function in packet-rlc.c due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a stack-based buffer overflow, resulting in a denial of service condition. (CVE-2016-6510)
- A denial of service vulnerability exists in the proto_tree_add_text_valist_internal() function in proto.c due to improper handling of packets. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a long loop and excessive CPU resource consumption. (CVE-2016-6511)
- Multiple flaws exist in the MMSE, WAP, WBXML, and WSP dissectors due to improper handling of packets. An unauthenticated, remote attacker can exploit these issues, via a specially crafted packet or packet trace file, to cause an infinite loop, resulting in a denial of service condition. (CVE-2016-6512)
- A denial of service vulnerability exists in the parse_wbxml_tag_defined() function in packet-wbxml.c due to improper handling of packets. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause an application crash. (CVE-2016-6513)
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://www.wireshark.org/security/wnpa-sec-2016-39.html https://www.wireshark.org/security/wnpa-sec-2016-41.html https://www.wireshark.org/security/wnpa-sec-2016-42.html https://www.wireshark.org/security/wnpa-sec-2016-44.html https://www.wireshark.org/security/wnpa-sec-2016-45.html https://www.wireshark.org/security/wnpa-sec-2016-46.html https://www.wireshark.org/security/wnpa-sec-2016-47.html https://www.wireshark.org/security/wnpa-sec-2016-48.html https://www.wireshark.org/security/wnpa-sec-2016-49.html https://www.wireshark.org/docs/relnotes/wireshark-2.0.5.html
* Platforms Affected: Wireshark versions 2 |
Recommendation |
Upgrade to the latest version Wireshark (2.0.5 or later), available from the Wireshark.org Web site at http://www.wireshark.org/download/win32/all-versions/ |
Related URL |
CVE-2016-6503,CVE-2016-6505,CVE-2016-6506,CVE-2016-6508,CVE-2016-6509,CVE-2016-6510,CVE-2016-6511,CVE-2016-6512,CVE-2016-6513 (CVE) |
Related URL |
92162,92163,92165,92166,92168,92169,92172,92173,92174 (SecurityFocus) |
Related URL |
(ISS) |
|