VID |
50309 |
Severity |
30 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The version of Wireshark installed on the remote Windows host is prior to 3.0.14. It is, therefore, affected by multiple vulnerabilities as referenced in the wireshark-3.0.14 advisory.
- The MIME Multipart dissector could crash. It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. (CVE-2020-25863)
- The TCP dissector could crash. It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. (CVE-2020-25862)
- The BLIP dissector could crash. It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. (CVE-2020-25866)
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://www.wireshark.org/docs/relnotes/wireshark-3.0.14.html https://www.wireshark.org/security/wnpa-sec-2020-11 https://www.wireshark.org/security/wnpa-sec-2020-12 https://www.wireshark.org/security/wnpa-sec-2020-13
* Platforms Affected: Wireshark versions 3.0.x prior to 3.0.14 Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version Wireshark (3.0.14 or later), available from the Wireshark.org Web site at http://www.wireshark.org/download/win32/all-versions/ |
Related URL |
CVE-2020-25862,CVE-2020-25863,CVE-2020-25866 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|