VID |
50225 |
Severity |
30 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The version of Wireshark installed on the remote Windows host is 2.4.x prior to 2.4.12. It is, therefore, affected by multiple denial of service vulnerabilities in the following protocol dissectors:
- P_MUL - RTSE - ISAKMP - ENIP
An attacker could cause Wireshark to crash by injecting a malformed packet onto the wire, or by convincing a user to read a malformed packet trace file.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://www.wireshark.org/docs/relnotes/wireshark-2.4.12.html https://www.wireshark.org/security/wnpa-sec-2019-01.html https://www.wireshark.org/security/wnpa-sec-2019-02.html https://www.wireshark.org/security/wnpa-sec-2019-03.html https://www.wireshark.org/security/wnpa-sec-2019-04.html https://www.wireshark.org/security/wnpa-sec-2019-05.html
* Platforms Affected: Wireshark versions 2.4.x prior to 2.4.12 Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version Wireshark (2.4.12 or later), available from the Wireshark.org Web site at http://www.wireshark.org/download/win32/all-versions/ |
Related URL |
CVE-2019-5717,CVE-2019-5718,CVE-2019-5719 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|