VID |
50114 |
Severity |
30 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The version of Wireshark installed on the remote Windows host is 2.2.x prior to 2.2.4. It is, therefore, affected by multiple denial of service vulnerabilities :
- A denial of service vulnerability exists when handling DHCPv6 packets due to an integer overflow condition in file epan/dissectors/packet-dhcpv6.c. An unauthenticated, remote attacker can exploit this to cause the program to enter a large loop that consumes excessive CPU resources. (VulnDB 150784)
- A denial of service vulnerability exists in the asterix_fspec_len() function within file epan/dissectors/packet-asterix.c due to an infinite loop flaw that is triggered because certain input is improperly validated. An unauthenticated, remote attacker can exploit this to consume excessive CPU resources. (VulnDB 150785)
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://www.wireshark.org/security/wnpa-sec-2017-01.html https://www.wireshark.org/security/wnpa-sec-2017-02.html
* Platforms Affected: Wireshark versions 2.2.x prior to 2.2.4 Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version Wireshark (2.2.4 or later), available from the Wireshark.org Web site at http://www.wireshark.org/download/win32/all-versions/ |
Related URL |
(CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|