VID |
50101 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The version of Wireshark installed on the remote Windows host is 2.2.x prior to 2.2.1. It is, therefore, affected by multiple denial of service vulnerabilities :
- A denial of service vulnerability exists in the ncp2222_compile_dfilters() function within file epan/dissectors/packet-ncp2222.inc due to improper handling of NCP frames. An unauthenticated, remote attacker can exploit this, via a specially crafted packet, to crash the process. (VulnDB 145253)
- A denial of service vulnerability exists in the dissect_disconnrequestresponse() function within file epan/dissectors/packet-btl2cap.c when handling short bluetooth service names. An unauthenticated, remote attacker can exploit this, via a specially crafted packet, to crash the process. (VulnDB 145254)
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://www.wireshark.org/security/wnpa-sec-2016-56.html https://www.wireshark.org/security/wnpa-sec-2016-57.html
* Platforms Affected: Wireshark versions 2.2.x prior to 2.2.1 Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version Wireshark (2.2.1 or later), available from the Wireshark.org Web site at http://www.wireshark.org/download/win32/all-versions/ |
Related URL |
(CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|