VID |
50132 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The version of Wireshark installed on the remote Windows host is 2.2.x prior to 2.2.9. It is, therefore, affected by multiple denial of service vulnerabilities in the IrCOMM, Profinet I/O, and MSDP dissectors.
An unauthenticated, remote attacker can exploit this by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
* References: https://www.wireshark.org/docs/relnotes/wireshark-2.2.9.html https://www.wireshark.org/security/wnpa-sec-2017-38.html https://www.wireshark.org/security/wnpa-sec-2017-39.html https://www.wireshark.org/security/wnpa-sec-2017-41.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13847 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13929 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13933
* Platforms Affected: Wireshark versions 2.2.x prior to 2.2.9 Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version Wireshark (2.2.9 or later), available from the Wireshark.org Web site at http://www.wireshark.org/download/win32/all-versions/ |
Related URL |
CVE-2017-13765,CVE-2017-13766,CVE-2017-13767 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|