VID |
50398 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The version of Wireshark installed on the remote Windows host is prior to 3.4.16. It is, therefore, affected by a vulnerability as referenced in the wireshark-3.4.16 advisory.
- The F5 Ethernet Trailer dissector could go into an infinite loop. It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. (wireshark-bug-18307)
* References: https://www.wireshark.org/security/wnpa-sec-2022-06 https://gitlab.com/wireshark/wireshark/-/issues/18307 https://www.wireshark.org/docs/relnotes/wireshark-3.4.16.html
* Platforms Affected: Wireshark versions 3.4.x prior to 3.4.16 Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version Wireshark (3.4.16 or later), available from the Wireshark.org Web site at http://www.wireshark.org/download/win32/all-versions/ |
Related URL |
N/A (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|