Korean
<< Back
VID 50101
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The version of Wireshark installed on the remote Windows host is 2.2.x prior to 2.2.1. It is, therefore, affected by multiple denial of service vulnerabilities :

- A denial of service vulnerability exists in the ncp2222_compile_dfilters() function within file epan/dissectors/packet-ncp2222.inc due to improper handling of NCP frames. An unauthenticated, remote attacker can exploit this, via a specially crafted
packet, to crash the process. (VulnDB 145253)

- A denial of service vulnerability exists in the dissect_disconnrequestresponse() function within file epan/dissectors/packet-btl2cap.c when handling short bluetooth service names. An unauthenticated, remote attacker can exploit this, via a specially crafted packet, to crash the process. (VulnDB 145254)

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
https://www.wireshark.org/security/wnpa-sec-2016-56.html
https://www.wireshark.org/security/wnpa-sec-2016-57.html

* Platforms Affected:
Wireshark versions 2.2.x prior to 2.2.1
Microsoft Windows Any version
Recommendation Upgrade to the latest version Wireshark (2.2.1 or later), available from the Wireshark.org Web site at http://www.wireshark.org/download/win32/all-versions/
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)