ID CVE-2016-4085 Type cve Reporter cve@mitre.org Modified 2016-12-03T03:27:00
Description
Stack-based buffer overflow in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.12.x before 1.12.11 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long string in a packet.
{"openvas": [{"lastseen": "2019-05-29T18:35:13", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-4085"], "description": "This host is installed with Wireshark\n and is prone to denial of service vulnerability.", "modified": "2018-11-12T00:00:00", "published": "2016-05-03T00:00:00", "id": "OPENVAS:1361412562310807576", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310807576", "type": "openvas", "title": "Wireshark NCP dissector Denial of Service Vulnerability May16 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_wireshark_ncp_dissector_dos_vuln_may16_win.nasl 12313 2018-11-12 08:53:51Z asteins $\n#\n# Wireshark NCP dissector Denial of Service Vulnerability May16 (Windows)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:wireshark:wireshark\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.807576\");\n script_version(\"$Revision: 12313 $\");\n script_cve_id(\"CVE-2016-4085\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-12 09:53:51 +0100 (Mon, 12 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2016-05-03 11:09:01 +0530 (Tue, 03 May 2016)\");\n script_name(\"Wireshark NCP dissector Denial of Service Vulnerability May16 (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Wireshark\n and is prone to denial of service vulnerability.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw is due to stack-based buffer\n overflow in 'epan/dissectors/packet-ncp2222.inc' script in the\n 'NCP dissector'.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to conduct denial of service attack or possibly have unspecified\n other impact.\");\n\n script_tag(name:\"affected\", value:\"Wireshark version 1.12.x before 1.12.11\n on Windows\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Wireshark version 1.12.11 or\n later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-28.html\");\n\n script_category(ACT_GATHER_INFO);\n script_family(\"Denial of Service\");\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_dependencies(\"gb_wireshark_detect_win.nasl\");\n script_mandatory_keys(\"Wireshark/Win/Ver\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!wirversion = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(version:wirversion, test_version:\"1.12.0\", test_version2:\"1.12.10\"))\n{\n report = report_fixed_ver(installed_version:wirversion, fixed_version:\"1.12.11\");\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:35:29", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-4085"], "description": "This host is installed with Wireshark\n and is prone to denial of service vulnerability.", "modified": "2018-10-17T00:00:00", "published": "2016-05-03T00:00:00", "id": "OPENVAS:1361412562310807580", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310807580", "type": "openvas", "title": "Wireshark NCP dissector Denial of Service Vulnerability May16 (Mac OS X)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_wireshark_ncp_dissector_dos_vuln_may16_macosx.nasl 11938 2018-10-17 10:08:39Z asteins $\n#\n# Wireshark NCP dissector Denial of Service Vulnerability May16 (Mac OS X)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:wireshark:wireshark\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.807580\");\n script_version(\"$Revision: 11938 $\");\n script_cve_id(\"CVE-2016-4085\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-17 12:08:39 +0200 (Wed, 17 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2016-05-03 11:52:58 +0530 (Tue, 03 May 2016)\");\n script_name(\"Wireshark NCP dissector Denial of Service Vulnerability May16 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Wireshark\n and is prone to denial of service vulnerability.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw is due to stack-based buffer\n overflow in 'epan/dissectors/packet-ncp2222.inc' script in the\n 'NCP dissector'.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to conduct denial of service attack or possibly have unspecified\n other impact.\");\n\n script_tag(name:\"affected\", value:\"Wireshark version 1.12.x before 1.12.11\n on Mac OS X\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Wireshark version 1.12.11 or\n later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-28.html\");\n\n script_category(ACT_GATHER_INFO);\n script_family(\"Denial of Service\");\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_dependencies(\"gb_wireshark_detect_macosx.nasl\");\n script_mandatory_keys(\"Wireshark/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!wirversion = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(version:wirversion, test_version:\"1.12.0\", test_version2:\"1.12.10\"))\n{\n report = report_fixed_ver(installed_version:wirversion, fixed_version:\"1.12.11\");\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:35:37", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-4082", "CVE-2016-4081", "CVE-2016-4079", "CVE-2016-4085", "CVE-2016-4006", "CVE-2016-4080"], "description": "Multiple vulnerabilities were discovered\nin the dissectors/parsers for PKTC, IAX2, GSM CBCH and NCP which could result in\ndenial of service.", "modified": "2019-03-18T00:00:00", "published": "2016-05-22T00:00:00", "id": "OPENVAS:1361412562310703585", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703585", "type": "openvas", "title": "Debian Security Advisory DSA 3585-1 (wireshark - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3585.nasl 14279 2019-03-18 14:48:34Z cfischer $\n# Auto-generated from advisory DSA 3585-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703585\");\n script_version(\"$Revision: 14279 $\");\n script_cve_id(\"CVE-2016-4006\", \"CVE-2016-4079\", \"CVE-2016-4080\", \"CVE-2016-4081\",\n \"CVE-2016-4082\", \"CVE-2016-4085\");\n script_name(\"Debian Security Advisory DSA 3585-1 (wireshark - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:48:34 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-05-22 00:00:00 +0200 (Sun, 22 May 2016)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2016/dsa-3585.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(8|9)\");\n script_tag(name:\"affected\", value:\"wireshark on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (jessie),\nthese problems have been fixed in version 1.12.1+g01b65bf-4+deb8u6.\n\nFor the testing distribution (stretch), these problems have been fixed\nin version 2.0.3+geed34f0-1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 2.0.3+geed34f0-1.\n\nWe recommend that you upgrade your wireshark packages.\");\n script_tag(name:\"summary\", value:\"Multiple vulnerabilities were discovered\nin the dissectors/parsers for PKTC, IAX2, GSM CBCH and NCP which could result in\ndenial of service.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software\nversion using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark5:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark5:i386\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif((res = isdpkgvuln(pkg:\"tshark\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dbg\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark6\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap5\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil6\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tshark\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-gtk\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2017-07-24T12:54:49", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-4082", "CVE-2016-4081", "CVE-2016-4079", "CVE-2016-4085", "CVE-2016-4006", "CVE-2016-4080"], "description": "Multiple vulnerabilities were discovered\nin the dissectors/parsers for PKTC, IAX2, GSM CBCH and NCP which could result in\ndenial of service.", "modified": "2017-07-07T00:00:00", "published": "2016-05-22T00:00:00", "id": "OPENVAS:703585", "href": "http://plugins.openvas.org/nasl.php?oid=703585", "type": "openvas", "title": "Debian Security Advisory DSA 3585-1 (wireshark - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3585.nasl 6608 2017-07-07 12:05:05Z cfischer $\n# Auto-generated from advisory DSA 3585-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703585);\n script_version(\"$Revision: 6608 $\");\n script_cve_id(\"CVE-2016-4006\", \"CVE-2016-4079\", \"CVE-2016-4080\", \"CVE-2016-4081\",\n \"CVE-2016-4082\", \"CVE-2016-4085\");\n script_name(\"Debian Security Advisory DSA 3585-1 (wireshark - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:05 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2016-05-22 00:00:00 +0200 (Sun, 22 May 2016)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2016/dsa-3585.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"wireshark on Debian Linux\");\n script_tag(name: \"insight\", value: \"Wireshark is a network 'sniffer' -\na tool that captures and analyzes packets off the wire. Wireshark can decode\ntoo many protocols to list here.\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie),\nthese problems have been fixed in version 1.12.1+g01b65bf-4+deb8u6.\n\nFor the testing distribution (stretch), these problems have been fixed\nin version 2.0.3+geed34f0-1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 2.0.3+geed34f0-1.\n\nWe recommend that you upgrade your wireshark packages.\");\n script_tag(name: \"summary\", value: \"Multiple vulnerabilities were discovered\nin the dissectors/parsers for PKTC, IAX2, GSM CBCH and NCP which could result in\ndenial of service.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software\nversion using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark5:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark5:i386\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif ((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif ((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif ((res = isdpkgvuln(pkg:\"tshark\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dbg\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark6\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap5\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil6\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tshark\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-gtk\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2020-01-27T18:34:20", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-9347", "CVE-2015-8713", "CVE-2015-8717", "CVE-2016-5350", "CVE-2015-8714", "CVE-2016-2531", "CVE-2016-6505", "CVE-2016-2530", "CVE-2016-6510", "CVE-2016-4081", "CVE-2016-7177", "CVE-2015-8719", "CVE-2017-9349", "CVE-2016-7179", "CVE-2016-4077", "CVE-2015-8731", "CVE-2018-19622", "CVE-2018-14341", "CVE-2015-8723", "CVE-2018-7418", "CVE-2016-4085", "CVE-2018-5336", "CVE-2016-6508", "CVE-2016-5353", "CVE-2016-5359", "CVE-2018-16057", "CVE-2017-13765", "CVE-2015-8729", "CVE-2015-8721", "CVE-2016-9375", "CVE-2016-6507", "CVE-2017-9345", "CVE-2016-2532", "CVE-2017-7703", "CVE-2016-7958", "CVE-2015-8712", "CVE-2016-4006", "CVE-2016-2523", "CVE-2018-14340", "CVE-2015-8716", "CVE-2017-9352", "CVE-2015-8718", "CVE-2017-17083"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220192425", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220192425", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for wireshark (EulerOS-SA-2019-2425)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.2425\");\n script_version(\"2020-01-23T15:31:18+0000\");\n script_cve_id(\"CVE-2015-8712\", \"CVE-2015-8713\", \"CVE-2015-8714\", \"CVE-2015-8716\", \"CVE-2015-8717\", \"CVE-2015-8718\", \"CVE-2015-8719\", \"CVE-2015-8721\", \"CVE-2015-8723\", \"CVE-2015-8729\", \"CVE-2015-8731\", \"CVE-2016-2523\", \"CVE-2016-2530\", \"CVE-2016-2531\", \"CVE-2016-2532\", \"CVE-2016-4006\", \"CVE-2016-4077\", \"CVE-2016-4081\", \"CVE-2016-4085\", \"CVE-2016-5350\", \"CVE-2016-5353\", \"CVE-2016-5359\", \"CVE-2016-6505\", \"CVE-2016-6507\", \"CVE-2016-6508\", \"CVE-2016-6510\", \"CVE-2016-7177\", \"CVE-2016-7179\", \"CVE-2016-7958\", \"CVE-2016-9375\", \"CVE-2017-13765\", \"CVE-2017-17083\", \"CVE-2017-7703\", \"CVE-2017-9345\", \"CVE-2017-9347\", \"CVE-2017-9349\", \"CVE-2017-9352\", \"CVE-2018-14340\", \"CVE-2018-14341\", \"CVE-2018-16057\", \"CVE-2018-19622\", \"CVE-2018-5336\", \"CVE-2018-7418\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 15:31:18 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 12:54:39 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for wireshark (EulerOS-SA-2019-2425)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP2\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-2425\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2425\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'wireshark' package(s) announced via the EulerOS-SA-2019-2425 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.(CVE-2018-14340)\n\nIn Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.(CVE-2018-14341)\n\nIn Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB dissectors could crash. This was addressed in epan/tvbparse.c by limiting the recursion depth.(CVE-2018-5336)\n\nIn Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by correcting the extraction of the length value.(CVE-2018-7418)\n\nIn Wireshark 2.2.0 to 2.2.6, the ROS dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/asn1/ros/packet-ros-template.c by validating an OID.(CVE-2017-9347)\n\nIn Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an infinite loop. This was addressed in epan/dissectors/packet-dcm.c by validating a length value.(CVE-2017-9349)\n\nIn Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.(CVE-2018-14340)\n\nIn Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.(CVE-2018-14341)\n\nIn Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the MMSE dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-mmse.c by preventing length overflows.(CVE-2018-19622)\n\nThe dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.(CVE-2015-8714)\n\nIn Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the IrCOMM dissector has a buffer over-read and application crash. This was addressed in plugins/irda/packet-ircomm.c by adding length validation.(CVE-2017-13765)\n\nIn Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the NetBIOS dissector could crash. This was addressed in epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'wireshark' package(s) on Huawei EulerOS V2.0SP2.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP2\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"wireshark\", rpm:\"wireshark~1.10.14~7.h12\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"wireshark-gnome\", rpm:\"wireshark-gnome~1.10.14~7.h12\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "debian": [{"lastseen": "2020-08-12T00:57:25", "bulletinFamily": "unix", "cvelist": ["CVE-2016-4082", "CVE-2016-4081", "CVE-2016-4079", "CVE-2016-4085", "CVE-2016-4006", "CVE-2016-4080"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3585-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nMay 22, 2016 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : wireshark\nCVE ID : CVE-2016-4006 CVE-2016-4079 CVE-2016-4080 CVE-2016-4081 \n CVE-2016-4082 CVE-2016-4085\n\nMultiple vulnerabilities were discovered in the dissectors/parsers for\nPKTC, IAX2, GSM CBCH and NCP which could result in denial of service.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 1.12.1+g01b65bf-4+deb8u6.\n\nFor the testing distribution (stretch), these problems have been fixed\nin version 2.0.3+geed34f0-1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 2.0.3+geed34f0-1.\n\nWe recommend that you upgrade your wireshark packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 8, "modified": "2016-05-22T21:29:55", "published": "2016-05-22T21:29:55", "id": "DEBIAN:DSA-3585-1:31520", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2016/msg00162.html", "title": "[SECURITY] [DSA 3585-1] wireshark security update", "type": "debian", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-30T02:22:27", "bulletinFamily": "unix", "cvelist": ["CVE-2013-1576", "CVE-2016-4082", "CVE-2012-6054", "CVE-2013-6339", "CVE-2013-4079", "CVE-2013-4931", "CVE-2013-1580", "CVE-2016-4081", "CVE-2013-1574", "CVE-2013-2476", "CVE-2013-1581", "CVE-2012-6057", "CVE-2012-6053", "CVE-2013-2479", "CVE-2013-4927", "CVE-2013-1573", "CVE-2013-7112", "CVE-2012-6060", "CVE-2016-4079", "CVE-2015-6243", "CVE-2015-6246", "CVE-2013-1577", "CVE-2016-4085", "CVE-2012-6055", "CVE-2012-6058", "CVE-2013-1572", "CVE-2012-6056", "CVE-2013-2482", "CVE-2013-1578", "CVE-2012-6052", "CVE-2012-6061", "CVE-2013-2487", "CVE-2012-6062", "CVE-2013-2486", "CVE-2013-4929", "CVE-2013-2485", "CVE-2013-5719", "CVE-2016-4006", "CVE-2015-6248", "CVE-2016-4080", "CVE-2013-1579", "CVE-2013-4080", "CVE-2012-6059", "CVE-2013-1575", "CVE-2013-5721"], "description": "Package : wireshark\nVersion : 1.12.1+g01b65bf-4+deb8u6~deb7u1\nCVE ID : CVE-2012-6052 CVE-2012-6053 CVE-2012-6054 CVE-2012-6055\n CVE-2012-6056 CVE-2012-6057 CVE-2012-6058 CVE-2012-6059\n CVE-2012-6060 CVE-2012-6061 CVE-2012-6062 CVE-2013-1572\n CVE-2013-1573 CVE-2013-1574 CVE-2013-1575 CVE-2013-1576\n CVE-2013-1577 CVE-2013-1578 CVE-2013-1579 CVE-2013-1580\n CVE-2013-1581 CVE-2013-2476 CVE-2013-2479 CVE-2013-2482\n CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-4079\n CVE-2013-4080 CVE-2013-4927 CVE-2013-4929 CVE-2013-4931\n CVE-2013-5719 CVE-2013-5721 CVE-2013-6339 CVE-2013-7112\n CVE-2015-6243 CVE-2015-6246 CVE-2015-6248 CVE-2016-4006\n CVE-2016-4079 CVE-2016-4080 CVE-2016-4081 CVE-2016-4082\n CVE-2016-4085\n\nMultiple vulnerabilities were discovered in the dissectors/parsers for\nPKTC, IAX2, GSM CBCH and NCP which could result in denial of service.\n\nThis update also fixes many older less important issues by updating the\npackage to the version found in Debian 8 also known as Jessie.\n\nFor Debian 7 "Wheezy", these problems have been fixed in version\n1.12.1+g01b65bf-4+deb8u6~deb7u1.\n\nWe recommend that you upgrade your wireshark packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 3, "modified": "2016-05-31T10:22:50", "published": "2016-05-31T10:22:50", "id": "DEBIAN:DLA-497-1:1FD56", "href": "https://lists.debian.org/debian-lts-announce/2016/debian-lts-announce-201605/msg00051.html", "title": "[SECURITY] [DLA 497-1] wireshark security update", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "nessus": [{"lastseen": "2021-01-12T09:49:37", "description": "Multiple vulnerabilities were discovered in the dissectors/parsers for\nPKTC, IAX2, GSM CBCH and NCP which could result in denial of service.", "edition": 24, "cvss3": {"score": 5.9, "vector": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2016-05-23T00:00:00", "title": "Debian DSA-3585-1 : wireshark - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-4082", "CVE-2016-4081", "CVE-2016-4079", "CVE-2016-4085", "CVE-2016-4006", "CVE-2016-4080"], "modified": "2016-05-23T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:wireshark", "cpe:/o:debian:debian_linux:8.0"], "id": "DEBIAN_DSA-3585.NASL", "href": "https://www.tenable.com/plugins/nessus/91288", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3585. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(91288);\n script_version(\"2.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-4006\", \"CVE-2016-4079\", \"CVE-2016-4080\", \"CVE-2016-4081\", \"CVE-2016-4082\", \"CVE-2016-4085\");\n script_xref(name:\"DSA\", value:\"3585\");\n\n script_name(english:\"Debian DSA-3585-1 : wireshark - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities were discovered in the dissectors/parsers for\nPKTC, IAX2, GSM CBCH and NCP which could result in denial of service.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/wireshark\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2016/dsa-3585\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the wireshark packages.\n\nFor the stable distribution (jessie), these problems have been fixed\nin version 1.12.1+g01b65bf-4+deb8u6.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/05/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/05/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark-data\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark5\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwiretap-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwiretap4\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwsutil-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwsutil4\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"tshark\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-common\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-dbg\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-doc\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-qt\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T03:41:28", "description": "The version of Wireshark installed on the remote Mac OS X host is\n1.12.x prior to 1.12.11. It is, therefore, affected by multiple denial\nof service vulnerabilities in the following components :\n\n - GSM CBCH dissector\n - IAX2 dissector\n - IEEE 802.11 dissector\n - NCP dissector\n - PKTC dissector", "edition": 25, "cvss3": {"score": 5.9, "vector": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2016-04-29T00:00:00", "title": "Wireshark 1.12.x < 1.12.11 Multiple DoS (Mac OS X)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-4082", "CVE-2016-4081", "CVE-2016-4079", "CVE-2016-4085", "CVE-2016-4006", "CVE-2016-4080", "CVE-2016-4078"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:wireshark:wireshark"], "id": "MACOSX_WIRESHARK_1_12_11.NASL", "href": "https://www.tenable.com/plugins/nessus/90784", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(90784);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/20\");\n\n script_cve_id(\n \"CVE-2016-4006\",\n \"CVE-2016-4078\",\n \"CVE-2016-4079\",\n \"CVE-2016-4080\",\n \"CVE-2016-4081\",\n \"CVE-2016-4082\",\n \"CVE-2016-4085\"\n );\n script_xref(name:\"EDB-ID\", value:\"39604\");\n script_xref(name:\"EDB-ID\", value:\"39644\");\n\n script_name(english:\"Wireshark 1.12.x < 1.12.11 Multiple DoS (Mac OS X)\");\n script_summary(english:\"Checks the version of Wireshark.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host has an application installed that is affected\nby multiple denial of service vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Wireshark installed on the remote Mac OS X host is\n1.12.x prior to 1.12.11. It is, therefore, affected by multiple denial\nof service vulnerabilities in the following components :\n\n - GSM CBCH dissector\n - IAX2 dissector\n - IEEE 802.11 dissector\n - NCP dissector\n - PKTC dissector\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Wireshark version 1.12.11 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-4085\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/02/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/04/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/04/29\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:wireshark:wireshark\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_wireshark_installed.nbin\");\n script_require_keys(\"installed_sw/Wireshark\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nget_kb_item_or_exit(\"Host/MacOSX/Version\");\n\napp_name = \"Wireshark\";\ninstall = get_single_install(app_name:app_name, exit_if_unknown_ver:TRUE);\nversion = install['version'];\npath = install['path'];\nfix = '1.12.11';\n\n# Affected :\n# 1.12.x < 1.12.11\nif (version =~ '^1\\\\.12\\\\.' && ver_compare(ver:version, fix:fix, strict:FALSE) < 0)\n{\n \n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n\n security_report_v4(port:0, severity:SECURITY_WARNING, extra:report);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T07:00:50", "description": "The version of Wireshark installed on the remote Windows host is\n1.12.x prior to 1.12.11. It is, therefore, affected by multiple denial\nof service vulnerabilities in the following components :\n\n - GSM CBCH dissector\n - IAX2 dissector\n - IEEE 802.11 dissector\n - NCP dissector\n - PKTC dissector", "edition": 25, "cvss3": {"score": 5.9, "vector": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2016-04-29T00:00:00", "title": "Wireshark 1.12.x < 1.12.11 Multiple DoS", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-4082", "CVE-2016-4081", "CVE-2016-4079", "CVE-2016-4085", "CVE-2016-4006", "CVE-2016-4080", "CVE-2016-4078"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:wireshark:wireshark"], "id": "WIRESHARK_1_12_11.NASL", "href": "https://www.tenable.com/plugins/nessus/90786", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(90786);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/20\");\n\n script_cve_id(\n \"CVE-2016-4006\",\n \"CVE-2016-4078\",\n \"CVE-2016-4079\",\n \"CVE-2016-4080\",\n \"CVE-2016-4081\",\n \"CVE-2016-4082\",\n \"CVE-2016-4085\"\n );\n script_xref(name:\"EDB-ID\", value:\"39604\");\n script_xref(name:\"EDB-ID\", value:\"39644\");\n\n script_name(english:\"Wireshark 1.12.x < 1.12.11 Multiple DoS\");\n script_summary(english:\"Checks the version of Wireshark.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host has an application installed that is affected\nby multiple denial of service vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Wireshark installed on the remote Windows host is\n1.12.x prior to 1.12.11. It is, therefore, affected by multiple denial\nof service vulnerabilities in the following components :\n\n - GSM CBCH dissector\n - IAX2 dissector\n - IEEE 802.11 dissector\n - NCP dissector\n - PKTC dissector\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Wireshark version 1.12.11 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-4085\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/02/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/04/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/04/29\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:wireshark:wireshark\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"wireshark_installed.nasl\");\n script_require_keys(\"installed_sw/Wireshark\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\n\napp_name = \"Wireshark\";\ninstall = get_single_install(app_name:app_name, exit_if_unknown_ver:TRUE);\nversion = install['version'];\npath = install['path'];\nfix = '1.12.11';\n\n# Affected :\n# 1.12.x < 1.12.11\nif (version =~ '^1\\\\.12\\\\.' && ver_compare(ver:version, fix:fix, strict:FALSE) < 0)\n{\n port = get_kb_item(\"SMB/transport\");\n if (!port) port = 445;\n\n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n\n security_report_v4(port:port, severity:SECURITY_WARNING, extra:report);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T01:57:41", "description": "CVE-2015-8711\n\nepan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark\n1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate\nconversation data, which allows remote attackers to cause a denial of\nservice (NULL pointer dereference and application crash) via a crafted\npacket.\n\nCVE-2015-8714 The dissect_dcom_OBJREF function in\nepan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark\n1.12.x before 1.12.9 does not initialize a certain IPv4 data\nstructure, which allows remote attackers to cause a denial of service\n(application crash) via a crafted packet.\n\nCVE-2015-8716 The init_t38_info_conv function in\nepan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x\nbefore 1.12.9 does not ensure that a conversation exists, which allows\nremote attackers to cause a denial of service (application crash) via\na crafted packet.\n\nCVE-2015-8717 The dissect_sdp function in epan/dissectors/packet-sdp.c\nin the SDP dissector in Wireshark 1.12.x before 1.12.9 does not\nprevent use of a negative media count, which allows remote attackers\nto cause a denial of service (application crash) via a crafted packet.\n\nCVE-2015-8718 Double free vulnerability in\nepan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x\nbefore 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets\nfor async NLM' option is enabled, allows remote attackers to cause a\ndenial of service (application crash) via a crafted packet.\n\nCVE-2015-8720 The dissect_ber_GeneralizedTime function in\nepan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x\nbefore 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf\nreturn value, which allows remote attackers to cause a denial of\nservice (application crash) via a crafted packet.\n\nCVE-2015-8721 Buffer overflow in the tvb_uncompress function in\nepan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before\n2.0.1 allows remote attackers to cause a denial of service\n(application crash) via a crafted packet with zlib compression.\n\nCVE-2015-8723 The AirPDcapPacketProcess function in\nepan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x\nbefore 1.12.9 and 2.0.x before 2.0.1 does not validate the\nrelationship between the total length and the capture length, which\nallows remote attackers to cause a denial of service (stack-based\nbuffer overflow and application crash) via a crafted packet.\n\nCVE-2015-8725 The dissect_diameter_base_framed_ipv6_prefix function in\nepan/dissectors/packet-diameter.c in the DIAMETER dissector in\nWireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not\nvalidate the IPv6 prefix length, which allows remote attackers to\ncause a denial of service (stack-based buffer overflow and application\ncrash) via a crafted packet.\n\nCVE-2015-8729 The ascend_seek function in wiretap/ascendtext.c in the\nAscend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before\n2.0.1 does not ensure the presence of a '\\0' character at the end of a\ndate string, which allows remote attackers to cause a denial of\nservice (out-of-bounds read and application crash) via a crafted file.\n\nCVE-2015-8730 epan/dissectors/packet-nbap.c in the NBAP dissector in\nWireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not\nvalidate the number of items, which allows remote attackers to cause a\ndenial of service (invalid read operation and application crash) via a\ncrafted packet.\n\nCVE-2015-8733 The ngsniffer_process_record function in\nwiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x\nbefore 1.12.9 and 2.0.x before 2.0.1 does not validate the\nrelationships between record lengths and record header lengths, which\nallows remote attackers to cause a denial of service (out-of-bounds\nread and application crash) via a crafted file.\n\nCVE-2016-2523 The dnp3_al_process_object function in\nepan/dissectors/packet-dnp.c in the DNP3 dissector in Wireshark 1.12.x\nbefore 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause\na denial of service (infinite loop) via a crafted packet.\n\nCVE-2016-4006 epan/proto.c in Wireshark 1.12.x before 1.12.11 and\n2.0.x before 2.0.3 does not limit the protocol-tree depth, which\nallows remote attackers to cause a denial of service (stack memory\nconsumption and application crash) via a crafted packet.\n\nCVE-2016-4078 The IEEE 802.11 dissector in Wireshark 1.12.x before\n1.12.11 and 2.0.x before 2.0.3 does not properly restrict element\nlists, which allows remote attackers to cause a denial of service\n(deep recursion and application crash) via a crafted packet, related\nto epan/dissectors/packet-capwap.c and\nepan/dissectors/packet-ieee80211.c.\n\nCVE-2016-4079 epan/dissectors/packet-pktc.c in the PKTC dissector in\nWireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not verify\nBER identifiers, which allows remote attackers to cause a denial of\nservice (out-of-bounds write and application crash) via a crafted\npacket.\n\nCVE-2016-4080 epan/dissectors/packet-pktc.c in the PKTC dissector in\nWireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 misparses\ntimestamp fields, which allows remote attackers to cause a denial of\nservice (out-of-bounds read and application crash) via a crafted\npacket.\n\nCVE-2016-4081 epan/dissectors/packet-iax2.c in the IAX2 dissector in\nWireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 uses an\nincorrect integer data type, which allows remote attackers to cause a\ndenial of service (infinite loop) via a crafted packet.\n\nCVE-2016-4085 Stack-based buffer overflow in\nepan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark\n1.12.x before 1.12.11 allows remote attackers to cause a denial of\nservice (application crash) or possibly have unspecified other impact\nvia a long string in a packet.\n\nImpact\n\nIf Wireshark is launched manually by a user with Advanced Shell ( bash\n) access, dissection of specially crafted packets could cause\nWireshark to consume excessive resources. Wireshark is not part of\nnormal BIG-IP operation; only users who actively run Wireshark are\nvulnerable.", "edition": 31, "cvss3": {"score": 5.9, "vector": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2016-06-27T00:00:00", "title": "F5 Networks BIG-IP : Multiple Wireshark (tshark) vulnerabilities (K01837042)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-8717", "CVE-2015-8730", "CVE-2015-8714", "CVE-2015-8733", "CVE-2016-4081", "CVE-2016-4079", "CVE-2015-8723", "CVE-2015-8720", "CVE-2016-4085", "CVE-2015-8725", "CVE-2015-8729", "CVE-2015-8721", "CVE-2016-4006", "CVE-2016-4080", "CVE-2016-2523", "CVE-2016-4078", "CVE-2015-8716", "CVE-2015-8711", "CVE-2015-8718"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:f5:big-ip_global_traffic_manager", "cpe:/a:f5:big-ip_link_controller", "cpe:/a:f5:big-ip_advanced_firewall_manager", "cpe:/a:f5:big-ip_policy_enforcement_manager", "cpe:/a:f5:big-ip_application_security_manager", "cpe:/a:f5:big-ip_application_acceleration_manager", "cpe:/h:f5:big-ip_protocol_security_manager", "cpe:/a:f5:big-ip_local_traffic_manager", "cpe:/h:f5:big-ip", "cpe:/a:f5:big-ip_application_visibility_and_reporting", "cpe:/a:f5:big-ip_access_policy_manager"], "id": "F5_BIGIP_SOL01837042.NASL", "href": "https://www.tenable.com/plugins/nessus/91838", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from F5 Networks BIG-IP Solution K01837042.\n#\n# The text description of this plugin is (C) F5 Networks.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(91838);\n script_version(\"2.10\");\n script_cvs_date(\"Date: 2019/01/04 10:03:40\");\n\n script_cve_id(\"CVE-2015-8711\", \"CVE-2015-8714\", \"CVE-2015-8716\", \"CVE-2015-8717\", \"CVE-2015-8718\", \"CVE-2015-8720\", \"CVE-2015-8721\", \"CVE-2015-8723\", \"CVE-2015-8725\", \"CVE-2015-8729\", \"CVE-2015-8730\", \"CVE-2015-8733\", \"CVE-2016-2523\", \"CVE-2016-4006\", \"CVE-2016-4078\", \"CVE-2016-4079\", \"CVE-2016-4080\", \"CVE-2016-4081\", \"CVE-2016-4085\");\n\n script_name(english:\"F5 Networks BIG-IP : Multiple Wireshark (tshark) vulnerabilities (K01837042)\");\n script_summary(english:\"Checks the BIG-IP version.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote device is missing a vendor-supplied security patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"CVE-2015-8711\n\nepan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark\n1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate\nconversation data, which allows remote attackers to cause a denial of\nservice (NULL pointer dereference and application crash) via a crafted\npacket.\n\nCVE-2015-8714 The dissect_dcom_OBJREF function in\nepan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark\n1.12.x before 1.12.9 does not initialize a certain IPv4 data\nstructure, which allows remote attackers to cause a denial of service\n(application crash) via a crafted packet.\n\nCVE-2015-8716 The init_t38_info_conv function in\nepan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x\nbefore 1.12.9 does not ensure that a conversation exists, which allows\nremote attackers to cause a denial of service (application crash) via\na crafted packet.\n\nCVE-2015-8717 The dissect_sdp function in epan/dissectors/packet-sdp.c\nin the SDP dissector in Wireshark 1.12.x before 1.12.9 does not\nprevent use of a negative media count, which allows remote attackers\nto cause a denial of service (application crash) via a crafted packet.\n\nCVE-2015-8718 Double free vulnerability in\nepan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x\nbefore 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets\nfor async NLM' option is enabled, allows remote attackers to cause a\ndenial of service (application crash) via a crafted packet.\n\nCVE-2015-8720 The dissect_ber_GeneralizedTime function in\nepan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x\nbefore 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf\nreturn value, which allows remote attackers to cause a denial of\nservice (application crash) via a crafted packet.\n\nCVE-2015-8721 Buffer overflow in the tvb_uncompress function in\nepan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before\n2.0.1 allows remote attackers to cause a denial of service\n(application crash) via a crafted packet with zlib compression.\n\nCVE-2015-8723 The AirPDcapPacketProcess function in\nepan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x\nbefore 1.12.9 and 2.0.x before 2.0.1 does not validate the\nrelationship between the total length and the capture length, which\nallows remote attackers to cause a denial of service (stack-based\nbuffer overflow and application crash) via a crafted packet.\n\nCVE-2015-8725 The dissect_diameter_base_framed_ipv6_prefix function in\nepan/dissectors/packet-diameter.c in the DIAMETER dissector in\nWireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not\nvalidate the IPv6 prefix length, which allows remote attackers to\ncause a denial of service (stack-based buffer overflow and application\ncrash) via a crafted packet.\n\nCVE-2015-8729 The ascend_seek function in wiretap/ascendtext.c in the\nAscend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before\n2.0.1 does not ensure the presence of a '\\0' character at the end of a\ndate string, which allows remote attackers to cause a denial of\nservice (out-of-bounds read and application crash) via a crafted file.\n\nCVE-2015-8730 epan/dissectors/packet-nbap.c in the NBAP dissector in\nWireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not\nvalidate the number of items, which allows remote attackers to cause a\ndenial of service (invalid read operation and application crash) via a\ncrafted packet.\n\nCVE-2015-8733 The ngsniffer_process_record function in\nwiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x\nbefore 1.12.9 and 2.0.x before 2.0.1 does not validate the\nrelationships between record lengths and record header lengths, which\nallows remote attackers to cause a denial of service (out-of-bounds\nread and application crash) via a crafted file.\n\nCVE-2016-2523 The dnp3_al_process_object function in\nepan/dissectors/packet-dnp.c in the DNP3 dissector in Wireshark 1.12.x\nbefore 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause\na denial of service (infinite loop) via a crafted packet.\n\nCVE-2016-4006 epan/proto.c in Wireshark 1.12.x before 1.12.11 and\n2.0.x before 2.0.3 does not limit the protocol-tree depth, which\nallows remote attackers to cause a denial of service (stack memory\nconsumption and application crash) via a crafted packet.\n\nCVE-2016-4078 The IEEE 802.11 dissector in Wireshark 1.12.x before\n1.12.11 and 2.0.x before 2.0.3 does not properly restrict element\nlists, which allows remote attackers to cause a denial of service\n(deep recursion and application crash) via a crafted packet, related\nto epan/dissectors/packet-capwap.c and\nepan/dissectors/packet-ieee80211.c.\n\nCVE-2016-4079 epan/dissectors/packet-pktc.c in the PKTC dissector in\nWireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not verify\nBER identifiers, which allows remote attackers to cause a denial of\nservice (out-of-bounds write and application crash) via a crafted\npacket.\n\nCVE-2016-4080 epan/dissectors/packet-pktc.c in the PKTC dissector in\nWireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 misparses\ntimestamp fields, which allows remote attackers to cause a denial of\nservice (out-of-bounds read and application crash) via a crafted\npacket.\n\nCVE-2016-4081 epan/dissectors/packet-iax2.c in the IAX2 dissector in\nWireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 uses an\nincorrect integer data type, which allows remote attackers to cause a\ndenial of service (infinite loop) via a crafted packet.\n\nCVE-2016-4085 Stack-based buffer overflow in\nepan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark\n1.12.x before 1.12.11 allows remote attackers to cause a denial of\nservice (application crash) or possibly have unspecified other impact\nvia a long string in a packet.\n\nImpact\n\nIf Wireshark is launched manually by a user with Advanced Shell ( bash\n) access, dissection of specially crafted packets could cause\nWireshark to consume excessive resources. Wireshark is not part of\nnormal BIG-IP operation; only users who actively run Wireshark are\nvulnerable.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://support.f5.com/csp/article/K01837042\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade to one of the non-vulnerable versions listed in the F5\nSolution K01837042.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_access_policy_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_advanced_firewall_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_application_acceleration_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_application_security_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_application_visibility_and_reporting\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_global_traffic_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_link_controller\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_local_traffic_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_policy_enforcement_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/h:f5:big-ip\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/h:f5:big-ip_protocol_security_manager\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/06/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/06/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"F5 Networks Local Security Checks\");\n\n script_dependencies(\"f5_bigip_detect.nbin\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/BIG-IP/hotfix\", \"Host/BIG-IP/modules\", \"Host/BIG-IP/version\", \"Settings/ParanoidReport\");\n\n exit(0);\n}\n\n\ninclude(\"f5_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nversion = get_kb_item(\"Host/BIG-IP/version\");\nif ( ! version ) audit(AUDIT_OS_NOT, \"F5 Networks BIG-IP\");\nif ( isnull(get_kb_item(\"Host/BIG-IP/hotfix\")) ) audit(AUDIT_KB_MISSING, \"Host/BIG-IP/hotfix\");\nif ( ! get_kb_item(\"Host/BIG-IP/modules\") ) audit(AUDIT_KB_MISSING, \"Host/BIG-IP/modules\");\n\nsol = \"K01837042\";\nvmatrix = make_array();\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\n# AFM\nvmatrix[\"AFM\"] = make_array();\nvmatrix[\"AFM\"][\"affected\" ] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.4.0-11.6.2\");\nvmatrix[\"AFM\"][\"unaffected\"] = make_list(\"13.1.0\",\"12.1.3\");\n\n# AM\nvmatrix[\"AM\"] = make_array();\nvmatrix[\"AM\"][\"affected\" ] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.4.0-11.6.2\");\nvmatrix[\"AM\"][\"unaffected\"] = make_list(\"13.1.0\",\"12.1.3\");\n\n# APM\nvmatrix[\"APM\"] = make_array();\nvmatrix[\"APM\"][\"affected\" ] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.4.0-11.6.2\");\nvmatrix[\"APM\"][\"unaffected\"] = make_list(\"13.1.0\",\"12.1.3\",\"11.2.1\",\"10.2.1-10.2.4\");\n\n# ASM\nvmatrix[\"ASM\"] = make_array();\nvmatrix[\"ASM\"][\"affected\" ] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.4.0-11.6.2\");\nvmatrix[\"ASM\"][\"unaffected\"] = make_list(\"13.1.0\",\"12.1.3\",\"11.2.1\",\"10.2.1-10.2.4\");\n\n# AVR\nvmatrix[\"AVR\"] = make_array();\nvmatrix[\"AVR\"][\"affected\" ] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.4.0-11.6.2\");\nvmatrix[\"AVR\"][\"unaffected\"] = make_list(\"13.1.0\",\"12.1.3\",\"11.2.1\");\n\n# GTM\nvmatrix[\"GTM\"] = make_array();\nvmatrix[\"GTM\"][\"affected\" ] = make_list(\"11.4.0-11.6.2\");\nvmatrix[\"GTM\"][\"unaffected\"] = make_list(\"11.2.1\",\"10.2.1-10.2.4\");\n\n# LC\nvmatrix[\"LC\"] = make_array();\nvmatrix[\"LC\"][\"affected\" ] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.4.0-11.6.2\");\nvmatrix[\"LC\"][\"unaffected\"] = make_list(\"13.1.0\",\"12.1.3\",\"11.2.1\",\"10.2.1-10.2.4\");\n\n# LTM\nvmatrix[\"LTM\"] = make_array();\nvmatrix[\"LTM\"][\"affected\" ] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.4.0-11.6.2\");\nvmatrix[\"LTM\"][\"unaffected\"] = make_list(\"13.1.0\",\"12.1.3\",\"11.2.1\",\"10.2.1-10.2.4\");\n\n# PEM\nvmatrix[\"PEM\"] = make_array();\nvmatrix[\"PEM\"][\"affected\" ] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.4.0-11.6.2\");\nvmatrix[\"PEM\"][\"unaffected\"] = make_list(\"13.1.0\",\"12.1.3\");\n\n# PSM\nvmatrix[\"PSM\"] = make_array();\nvmatrix[\"PSM\"][\"affected\" ] = make_list(\"11.4.0-11.4.1\");\nvmatrix[\"PSM\"][\"unaffected\"] = make_list(\"10.2.1-10.2.4\");\n\n\nif (bigip_is_affected(vmatrix:vmatrix, sol:sol))\n{\n if (report_verbosity > 0) security_hole(port:0, extra:bigip_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = bigip_get_tested_modules();\n audit_extra = \"For BIG-IP module(s) \" + tested + \",\";\n if (tested) audit(AUDIT_INST_VER_NOT_VULN, audit_extra, version);\n else audit(AUDIT_HOST_NOT, \"running any of the affected modules\");\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-07T09:00:55", "description": "According to the versions of the wireshark packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - Wireshark is a network traffic analyzer for Unix-ish\n operating systems.This package lays base for libpcap, a\n packet capture and filtering library, contains\n command-line utilities, contains plugins and\n documentation for wireshark. A graphical user interface\n is packaged separately to GTK+ package.Security\n Fix(es):In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7,\n and 2.2.0 to 2.2.15, dissectors that support zlib\n decompression could crash. This was addressed in\n epan/tvbuff_zlib.c by rejecting negative lengths to\n avoid a buffer over-read.(CVE-2018-14340)In Wireshark\n 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15,\n the DICOM dissector could go into a large or infinite\n loop. This was addressed in\n epan/dissectors/packet-dcm.c by preventing an offset\n overflow.(CVE-2018-14341)In Wireshark 2.4.0 to 2.4.3\n and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB\n dissectors could crash. This was addressed in\n epan/tvbparse.c by limiting the recursion\n depth.(CVE-2018-5336)In Wireshark 2.2.0 to 2.2.12 and\n 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This\n was addressed in epan/dissectors/packet-sigcomp.c by\n correcting the extraction of the length\n value.(CVE-2018-7418)In Wireshark 2.2.0 to 2.2.6, the\n ROS dissector could crash with a NULL pointer\n dereference. This was addressed in\n epan/dissectors/asn1/ros/packet-ros-template.c by\n validating an OID.(CVE-2017-9347)In Wireshark 2.2.0 to\n 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an\n infinite loop. This was addressed in\n epan/dissectors/packet-dcm.c by validating a length\n value.(CVE-2017-9349)In Wireshark 2.6.0 to 2.6.4 and\n 2.4.0 to 2.4.10, the MMSE dissector could go into an\n infinite loop. This was addressed in\n epan/dissectors/packet-mmse.c by preventing length\n overflows.(CVE-2018-19622)The dissect_dcom_OBJREF\n function in epan/dissectors/packet-dcom.c in the DCOM\n dissector in Wireshark 1.12.x before 1.12.9 does not\n initialize a certain IPv4 data structure, which allows\n remote attackers to cause a denial of service\n (application crash) via a crafted\n packet.(CVE-2015-8714)In Wireshark 2.4.0, 2.2.0 to\n 2.2.8, and 2.0.0 to 2.0.14, the IrCOMM dissector has a\n buffer over-read and application crash. This was\n addressed in plugins/irda/packet-ircomm.c by adding\n length validation.(CVE-2017-13765)In Wireshark 2.4.0 to\n 2.4.2 and 2.2.0 to 2.2.10, the NetBIOS dissector could\n crash. This was addressed in\n epan/dissectors/packet-netbios.c by ensuring that write\n operations are bounded by the beginning of a\n buffer.(CVE-2017-17083)The dissect_hsdsch_channel_info\n function in epan/dissectors/packet-umts_fp.c in the\n UMTS FP dissector in Wireshark 1.12.x before 1.12.9\n does not validate the number of PDUs, which allows\n remote attackers to cause a denial of service\n (application crash) via a crafted\n packet.(CVE-2015-8712)epan/dissectors/packet-umts_fp.c\n in the UMTS FP dissector in Wireshark 1.12.x before\n 1.12.9 does not properly reserve memory for channel ID\n mappings, which allows remote attackers to cause a\n denial of service (out-of-bounds memory access and\n application crash) via a crafted\n packet.(CVE-2015-8713)In Wireshark 2.2.0 to 2.2.5 and\n 2.0.0 to 2.0.11, the IMAP dissector could crash,\n triggered by packet injection or a malformed capture\n file. This was addressed in\n epan/dissectors/packet-imap.c by calculating a line's\n end correctly.(CVE-2017-7703)In Wireshark 2.2.0 to\n 2.2.6 and 2.0.0 to 2.0.12, the DNS dissector could go\n into an infinite loop. This was addressed in\n epan/dissectors/packet-dns.c by trying to detect\n self-referencing pointers.(CVE-2017-9345)In Wireshark\n 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bazaar\n dissector could go into an infinite loop. This was\n addressed in epan/dissectors/packet-bzr.c by ensuring\n that backwards parsing cannot occur.(CVE-2017-9352)In\n Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to\n 2.2.16, the Radiotap dissector could crash. This was\n addressed in\n epan/dissectors/packet-ieee80211-radiotap-iter.c by\n validating iterator\n operations.(CVE-2018-16057)epan/dissectors/packet-catap\n ult-dct2000.c in the Catapult DCT2000 dissector in\n Wireshark 2.x before 2.0.6 does not restrict the number\n of channels, which allows remote attackers to cause a\n denial of service (buffer over-read and application\n crash) via a crafted packet.(CVE-2016-7177)Stack-based\n buffer overflow in\n epan/dissectors/packet-catapult-dct2000.c in the\n Catapult DCT2000 dissector in Wireshark 2.x before\n 2.0.6 allows remote attackers to cause a denial of\n service (application crash) via a crafted\n packet.(CVE-2016-7179)In Wireshark 2.2.0, the NCP\n dissector could crash, triggered by packet injection or\n a malformed capture file. This was addressed in\n epan/dissectors/CMakeLists.txt by registering this\n dissector.(CVE-2016-7958)In Wireshark 2.2.0 to 2.2.1\n and 2.0.0 to 2.0.7, the DTN dissector could go into an\n infinite loop, triggered by network traffic or a\n capture file. This was addressed in\n epan/dissectors/packet-dtn.c by checking whether SDNV\n evaluation was\n successful.(CVE-2016-9375)epan/dissectors/packet-wbxml.\n c in the WBXML dissector in Wireshark 1.12.x before\n 1.12.12 mishandles offsets, which allows remote\n attackers to cause a denial of service (integer\n overflow and infinite loop) via a crafted\n packet.(CVE-2016-5359)epan/dissectors/packet-packetbb.c\n in the PacketBB dissector in Wireshark 1.12.x before\n 1.12.13 and 2.x before 2.0.5 allows remote attackers to\n cause a denial of service (divide-by-zero error and\n application crash) via a crafted\n packet.(CVE-2016-6505)epan/dissectors/packet-mmse.c in\n the MMSE dissector in Wireshark 1.12.x before 1.12.13\n allows remote attackers to cause a denial of service\n (infinite loop) via a crafted\n packet.(CVE-2016-6507)epan/dissectors/packet-rlc.c in\n the RLC dissector in Wireshark 1.12.x before 1.12.13\n and 2.x before 2.0.5 uses an incorrect integer data\n type, which allows remote attackers to cause a denial\n of service (large loop) via a crafted\n packet.(CVE-2016-6508)Off-by-one error in\n epan/dissectors/packet-rlc.c in the RLC dissector in\n Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5\n allows remote attackers to cause a denial of service\n (stack-based buffer overflow and application crash) via\n a crafted\n packet.(CVE-2016-6510)epan/dissectors/packet-iax2.c in\n the IAX2 dissector in Wireshark 1.12.x before 1.12.11\n and 2.0.x before 2.0.3 uses an incorrect integer data\n type, which allows remote attackers to cause a denial\n of service (infinite loop) via a crafted\n packet.(CVE-2016-4081)Stack-based buffer overflow in\n epan/dissectors/packet-ncp2222.inc in the NCP dissector\n in Wireshark 1.12.x before 1.12.11 allows remote\n attackers to cause a denial of service (application\n crash) or possibly have unspecified other impact via a\n long string in a\n packet.(CVE-2016-4085)epan/dissectors/packet-dcerpc-spo\n olss.c in the SPOOLS component in Wireshark 1.12.x\n before 1.12.12 and 2.x before 2.0.4 mishandles\n unexpected offsets, which allows remote attackers to\n cause a denial of service (infinite loop) via a crafted\n packet.(CVE-2016-5350)epan/dissectors/packet-umts_fp.c\n in the UMTS FP dissector in Wireshark 1.12.x before\n 1.12.12 and 2.x before 2.0.4 mishandles the reserved\n C/T value, which allows remote attackers to cause a\n denial of service (application crash) via a crafted\n packet.(CVE-2016-5353)Off-by-one error in\n epan/dissectors/packet-rsl.c in the RSL dissector in\n Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2\n allows remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted packet that triggers a 0xff tag value, a\n different vulnerability than\n CVE-2016-2530.(CVE-2016-2531)The\n dissect_llrp_parameters function in\n epan/dissectors/packet-llrp.c in the LLRP dissector in\n Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2\n does not limit the recursion depth, which allows remote\n attackers to cause a denial of service (memory\n consumption or application crash) via a crafted\n packet.(CVE-2016-2532)epan/proto.c in Wireshark 1.12.x\n before 1.12.11 and 2.0.x before 2.0.3 does not limit\n the protocol-tree depth, which allows remote attackers\n to cause a denial of service (stack memory consumption\n and application crash) via a crafted\n packet.(CVE-2016-4006)epan/reassemble.c in TShark in\n Wireshark 2.0.x before 2.0.3 relies on incorrect\n special-case handling of truncated Tvb data structures,\n which allows remote attackers to cause a denial of\n service (use-after-free and application crash) via a\n crafted packet.(CVE-2016-4077)The AirPDcapPacketProcess\n function in epan/crypt/airpdcap.c in the 802.11\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not validate the relationship between\n the total length and the capture length, which allows\n remote attackers to cause a denial of service\n (stack-based buffer overflow and application crash) via\n a crafted packet.(CVE-2015-8723)The ascend_seek\n function in wiretap/ascendtext.c in the Ascend file\n parser in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not ensure the presence of a '\\0'\n character at the end of a date string, which allows\n remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted file.(CVE-2015-8729)The dissct_rsl_ipaccess_msg\n function in epan/dissectors/packet-rsl.c in the RSL\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not reject unknown TLV types, which\n allows remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted packet.(CVE-2015-8731)The\n dissct_rsl_ipaccess_msg function in\n epan/dissectors/packet-rsl.c in the RSL dissector in\n Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2\n mishandles the case of an unrecognized TLV type, which\n allows remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted packet, a different vulnerability than\n CVE-2016-2531.(CVE-2016-2530)The dnp3_al_process_object\n function in epan/dissectors/packet-dnp.c in the DNP3\n dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x\n before 2.0.2 allows remote attackers to cause a denial\n of service (infinite loop) via a crafted\n packet.(CVE-2016-2523)The init_t38_info_conv function\n in epan/dissectors/packet-t38.c in the T.38 dissector\n in Wireshark 1.12.x before 1.12.9 does not ensure that\n a conversation exists, which allows remote attackers to\n cause a denial of service (application crash) via a\n crafted packet.(CVE-2015-8716)The dissect_sdp function\n in epan/dissectors/packet-sdp.c in the SDP dissector in\n Wireshark 1.12.x before 1.12.9 does not prevent use of\n a negative media count, which allows remote attackers\n to cause a denial of service (application crash) via a\n crafted packet.(CVE-2015-8717)Double free vulnerability\n in epan/dissectors/packet-nlm.c in the NLM dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1,\n when the 'Match MSG/RES packets for async NLM' option\n is enabled, allows remote attackers to cause a denial\n of service (application crash) via a crafted\n packet.(CVE-2015-8718)The dissect_dns_answer function\n in epan/dissectors/packet-dns.c in the DNS dissector in\n Wireshark 1.12.x before 1.12.9 mishandles the EDNS0\n Client Subnet option, which allows remote attackers to\n cause a denial of service (application crash) via a\n crafted packet.(CVE-2015-8719)Buffer overflow in the\n tvb_uncompress function in epan/tvbuff_zlib.c in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n allows remote attackers to cause a denial of service\n (application crash) via a crafted packet with zlib\n compression.(CVE-2015-8721)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 11, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2019-12-04T00:00:00", "title": "EulerOS 2.0 SP2 : wireshark (EulerOS-SA-2019-2425)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-9347", "CVE-2015-8713", "CVE-2015-8717", "CVE-2016-5350", "CVE-2015-8714", "CVE-2016-2531", "CVE-2016-6505", "CVE-2016-2530", "CVE-2016-6510", "CVE-2016-4081", "CVE-2016-7177", "CVE-2015-8719", "CVE-2017-9349", "CVE-2016-7179", "CVE-2016-4077", "CVE-2015-8731", "CVE-2018-19622", "CVE-2018-14341", "CVE-2015-8723", "CVE-2018-7418", "CVE-2016-4085", "CVE-2018-5336", "CVE-2016-6508", "CVE-2016-5353", "CVE-2016-5359", "CVE-2018-16057", "CVE-2017-13765", "CVE-2015-8729", "CVE-2015-8721", "CVE-2016-9375", "CVE-2016-6507", "CVE-2017-9345", "CVE-2016-2532", "CVE-2017-7703", "CVE-2016-7958", "CVE-2015-8712", "CVE-2016-4006", "CVE-2016-2523", "CVE-2018-14340", "CVE-2015-8716", "CVE-2017-9352", "CVE-2015-8718", "CVE-2017-17083"], "modified": "2019-12-04T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:wireshark", "p-cpe:/a:huawei:euleros:wireshark-gnome", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2019-2425.NASL", "href": "https://www.tenable.com/plugins/nessus/131579", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(131579);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2015-8712\",\n \"CVE-2015-8713\",\n \"CVE-2015-8714\",\n \"CVE-2015-8716\",\n \"CVE-2015-8717\",\n \"CVE-2015-8718\",\n \"CVE-2015-8719\",\n \"CVE-2015-8721\",\n \"CVE-2015-8723\",\n \"CVE-2015-8729\",\n \"CVE-2015-8731\",\n \"CVE-2016-2523\",\n \"CVE-2016-2530\",\n \"CVE-2016-2531\",\n \"CVE-2016-2532\",\n \"CVE-2016-4006\",\n \"CVE-2016-4077\",\n \"CVE-2016-4081\",\n \"CVE-2016-4085\",\n \"CVE-2016-5350\",\n \"CVE-2016-5353\",\n \"CVE-2016-5359\",\n \"CVE-2016-6505\",\n \"CVE-2016-6507\",\n \"CVE-2016-6508\",\n \"CVE-2016-6510\",\n \"CVE-2016-7177\",\n \"CVE-2016-7179\",\n \"CVE-2016-7958\",\n \"CVE-2016-9375\",\n \"CVE-2017-13765\",\n \"CVE-2017-17083\",\n \"CVE-2017-7703\",\n \"CVE-2017-9345\",\n \"CVE-2017-9347\",\n \"CVE-2017-9349\",\n \"CVE-2017-9352\",\n \"CVE-2018-14340\",\n \"CVE-2018-14341\",\n \"CVE-2018-16057\",\n \"CVE-2018-19622\",\n \"CVE-2018-5336\",\n \"CVE-2018-7418\"\n );\n\n script_name(english:\"EulerOS 2.0 SP2 : wireshark (EulerOS-SA-2019-2425)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the wireshark packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - Wireshark is a network traffic analyzer for Unix-ish\n operating systems.This package lays base for libpcap, a\n packet capture and filtering library, contains\n command-line utilities, contains plugins and\n documentation for wireshark. A graphical user interface\n is packaged separately to GTK+ package.Security\n Fix(es):In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7,\n and 2.2.0 to 2.2.15, dissectors that support zlib\n decompression could crash. This was addressed in\n epan/tvbuff_zlib.c by rejecting negative lengths to\n avoid a buffer over-read.(CVE-2018-14340)In Wireshark\n 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15,\n the DICOM dissector could go into a large or infinite\n loop. This was addressed in\n epan/dissectors/packet-dcm.c by preventing an offset\n overflow.(CVE-2018-14341)In Wireshark 2.4.0 to 2.4.3\n and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB\n dissectors could crash. This was addressed in\n epan/tvbparse.c by limiting the recursion\n depth.(CVE-2018-5336)In Wireshark 2.2.0 to 2.2.12 and\n 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This\n was addressed in epan/dissectors/packet-sigcomp.c by\n correcting the extraction of the length\n value.(CVE-2018-7418)In Wireshark 2.2.0 to 2.2.6, the\n ROS dissector could crash with a NULL pointer\n dereference. This was addressed in\n epan/dissectors/asn1/ros/packet-ros-template.c by\n validating an OID.(CVE-2017-9347)In Wireshark 2.2.0 to\n 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an\n infinite loop. This was addressed in\n epan/dissectors/packet-dcm.c by validating a length\n value.(CVE-2017-9349)In Wireshark 2.6.0 to 2.6.4 and\n 2.4.0 to 2.4.10, the MMSE dissector could go into an\n infinite loop. This was addressed in\n epan/dissectors/packet-mmse.c by preventing length\n overflows.(CVE-2018-19622)The dissect_dcom_OBJREF\n function in epan/dissectors/packet-dcom.c in the DCOM\n dissector in Wireshark 1.12.x before 1.12.9 does not\n initialize a certain IPv4 data structure, which allows\n remote attackers to cause a denial of service\n (application crash) via a crafted\n packet.(CVE-2015-8714)In Wireshark 2.4.0, 2.2.0 to\n 2.2.8, and 2.0.0 to 2.0.14, the IrCOMM dissector has a\n buffer over-read and application crash. This was\n addressed in plugins/irda/packet-ircomm.c by adding\n length validation.(CVE-2017-13765)In Wireshark 2.4.0 to\n 2.4.2 and 2.2.0 to 2.2.10, the NetBIOS dissector could\n crash. This was addressed in\n epan/dissectors/packet-netbios.c by ensuring that write\n operations are bounded by the beginning of a\n buffer.(CVE-2017-17083)The dissect_hsdsch_channel_info\n function in epan/dissectors/packet-umts_fp.c in the\n UMTS FP dissector in Wireshark 1.12.x before 1.12.9\n does not validate the number of PDUs, which allows\n remote attackers to cause a denial of service\n (application crash) via a crafted\n packet.(CVE-2015-8712)epan/dissectors/packet-umts_fp.c\n in the UMTS FP dissector in Wireshark 1.12.x before\n 1.12.9 does not properly reserve memory for channel ID\n mappings, which allows remote attackers to cause a\n denial of service (out-of-bounds memory access and\n application crash) via a crafted\n packet.(CVE-2015-8713)In Wireshark 2.2.0 to 2.2.5 and\n 2.0.0 to 2.0.11, the IMAP dissector could crash,\n triggered by packet injection or a malformed capture\n file. This was addressed in\n epan/dissectors/packet-imap.c by calculating a line's\n end correctly.(CVE-2017-7703)In Wireshark 2.2.0 to\n 2.2.6 and 2.0.0 to 2.0.12, the DNS dissector could go\n into an infinite loop. This was addressed in\n epan/dissectors/packet-dns.c by trying to detect\n self-referencing pointers.(CVE-2017-9345)In Wireshark\n 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bazaar\n dissector could go into an infinite loop. This was\n addressed in epan/dissectors/packet-bzr.c by ensuring\n that backwards parsing cannot occur.(CVE-2017-9352)In\n Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to\n 2.2.16, the Radiotap dissector could crash. This was\n addressed in\n epan/dissectors/packet-ieee80211-radiotap-iter.c by\n validating iterator\n operations.(CVE-2018-16057)epan/dissectors/packet-catap\n ult-dct2000.c in the Catapult DCT2000 dissector in\n Wireshark 2.x before 2.0.6 does not restrict the number\n of channels, which allows remote attackers to cause a\n denial of service (buffer over-read and application\n crash) via a crafted packet.(CVE-2016-7177)Stack-based\n buffer overflow in\n epan/dissectors/packet-catapult-dct2000.c in the\n Catapult DCT2000 dissector in Wireshark 2.x before\n 2.0.6 allows remote attackers to cause a denial of\n service (application crash) via a crafted\n packet.(CVE-2016-7179)In Wireshark 2.2.0, the NCP\n dissector could crash, triggered by packet injection or\n a malformed capture file. This was addressed in\n epan/dissectors/CMakeLists.txt by registering this\n dissector.(CVE-2016-7958)In Wireshark 2.2.0 to 2.2.1\n and 2.0.0 to 2.0.7, the DTN dissector could go into an\n infinite loop, triggered by network traffic or a\n capture file. This was addressed in\n epan/dissectors/packet-dtn.c by checking whether SDNV\n evaluation was\n successful.(CVE-2016-9375)epan/dissectors/packet-wbxml.\n c in the WBXML dissector in Wireshark 1.12.x before\n 1.12.12 mishandles offsets, which allows remote\n attackers to cause a denial of service (integer\n overflow and infinite loop) via a crafted\n packet.(CVE-2016-5359)epan/dissectors/packet-packetbb.c\n in the PacketBB dissector in Wireshark 1.12.x before\n 1.12.13 and 2.x before 2.0.5 allows remote attackers to\n cause a denial of service (divide-by-zero error and\n application crash) via a crafted\n packet.(CVE-2016-6505)epan/dissectors/packet-mmse.c in\n the MMSE dissector in Wireshark 1.12.x before 1.12.13\n allows remote attackers to cause a denial of service\n (infinite loop) via a crafted\n packet.(CVE-2016-6507)epan/dissectors/packet-rlc.c in\n the RLC dissector in Wireshark 1.12.x before 1.12.13\n and 2.x before 2.0.5 uses an incorrect integer data\n type, which allows remote attackers to cause a denial\n of service (large loop) via a crafted\n packet.(CVE-2016-6508)Off-by-one error in\n epan/dissectors/packet-rlc.c in the RLC dissector in\n Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5\n allows remote attackers to cause a denial of service\n (stack-based buffer overflow and application crash) via\n a crafted\n packet.(CVE-2016-6510)epan/dissectors/packet-iax2.c in\n the IAX2 dissector in Wireshark 1.12.x before 1.12.11\n and 2.0.x before 2.0.3 uses an incorrect integer data\n type, which allows remote attackers to cause a denial\n of service (infinite loop) via a crafted\n packet.(CVE-2016-4081)Stack-based buffer overflow in\n epan/dissectors/packet-ncp2222.inc in the NCP dissector\n in Wireshark 1.12.x before 1.12.11 allows remote\n attackers to cause a denial of service (application\n crash) or possibly have unspecified other impact via a\n long string in a\n packet.(CVE-2016-4085)epan/dissectors/packet-dcerpc-spo\n olss.c in the SPOOLS component in Wireshark 1.12.x\n before 1.12.12 and 2.x before 2.0.4 mishandles\n unexpected offsets, which allows remote attackers to\n cause a denial of service (infinite loop) via a crafted\n packet.(CVE-2016-5350)epan/dissectors/packet-umts_fp.c\n in the UMTS FP dissector in Wireshark 1.12.x before\n 1.12.12 and 2.x before 2.0.4 mishandles the reserved\n C/T value, which allows remote attackers to cause a\n denial of service (application crash) via a crafted\n packet.(CVE-2016-5353)Off-by-one error in\n epan/dissectors/packet-rsl.c in the RSL dissector in\n Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2\n allows remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted packet that triggers a 0xff tag value, a\n different vulnerability than\n CVE-2016-2530.(CVE-2016-2531)The\n dissect_llrp_parameters function in\n epan/dissectors/packet-llrp.c in the LLRP dissector in\n Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2\n does not limit the recursion depth, which allows remote\n attackers to cause a denial of service (memory\n consumption or application crash) via a crafted\n packet.(CVE-2016-2532)epan/proto.c in Wireshark 1.12.x\n before 1.12.11 and 2.0.x before 2.0.3 does not limit\n the protocol-tree depth, which allows remote attackers\n to cause a denial of service (stack memory consumption\n and application crash) via a crafted\n packet.(CVE-2016-4006)epan/reassemble.c in TShark in\n Wireshark 2.0.x before 2.0.3 relies on incorrect\n special-case handling of truncated Tvb data structures,\n which allows remote attackers to cause a denial of\n service (use-after-free and application crash) via a\n crafted packet.(CVE-2016-4077)The AirPDcapPacketProcess\n function in epan/crypt/airpdcap.c in the 802.11\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not validate the relationship between\n the total length and the capture length, which allows\n remote attackers to cause a denial of service\n (stack-based buffer overflow and application crash) via\n a crafted packet.(CVE-2015-8723)The ascend_seek\n function in wiretap/ascendtext.c in the Ascend file\n parser in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not ensure the presence of a '\\0'\n character at the end of a date string, which allows\n remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted file.(CVE-2015-8729)The dissct_rsl_ipaccess_msg\n function in epan/dissectors/packet-rsl.c in the RSL\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not reject unknown TLV types, which\n allows remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted packet.(CVE-2015-8731)The\n dissct_rsl_ipaccess_msg function in\n epan/dissectors/packet-rsl.c in the RSL dissector in\n Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2\n mishandles the case of an unrecognized TLV type, which\n allows remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted packet, a different vulnerability than\n CVE-2016-2531.(CVE-2016-2530)The dnp3_al_process_object\n function in epan/dissectors/packet-dnp.c in the DNP3\n dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x\n before 2.0.2 allows remote attackers to cause a denial\n of service (infinite loop) via a crafted\n packet.(CVE-2016-2523)The init_t38_info_conv function\n in epan/dissectors/packet-t38.c in the T.38 dissector\n in Wireshark 1.12.x before 1.12.9 does not ensure that\n a conversation exists, which allows remote attackers to\n cause a denial of service (application crash) via a\n crafted packet.(CVE-2015-8716)The dissect_sdp function\n in epan/dissectors/packet-sdp.c in the SDP dissector in\n Wireshark 1.12.x before 1.12.9 does not prevent use of\n a negative media count, which allows remote attackers\n to cause a denial of service (application crash) via a\n crafted packet.(CVE-2015-8717)Double free vulnerability\n in epan/dissectors/packet-nlm.c in the NLM dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1,\n when the 'Match MSG/RES packets for async NLM' option\n is enabled, allows remote attackers to cause a denial\n of service (application crash) via a crafted\n packet.(CVE-2015-8718)The dissect_dns_answer function\n in epan/dissectors/packet-dns.c in the DNS dissector in\n Wireshark 1.12.x before 1.12.9 mishandles the EDNS0\n Client Subnet option, which allows remote attackers to\n cause a denial of service (application crash) via a\n crafted packet.(CVE-2015-8719)Buffer overflow in the\n tvb_uncompress function in epan/tvbuff_zlib.c in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n allows remote attackers to cause a denial of service\n (application crash) via a crafted packet with zlib\n compression.(CVE-2015-8721)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2425\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?53098281\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected wireshark packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/04\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:wireshark-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(2)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"wireshark-1.10.14-7.h12\",\n \"wireshark-gnome-1.10.14-7.h12\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"2\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-12T09:43:49", "description": "Multiple vulnerabilities were discovered in the dissectors/parsers for\nPKTC, IAX2, GSM CBCH and NCP which could result in denial of service.\n\nThis update also fixes many older less important issues by updating\nthe package to the version found in Debian 8 also known as Jessie.\n\nFor Debian 7 'Wheezy', these problems have been fixed in version\n1.12.1+g01b65bf-4+deb8u6~deb7u1.\n\nWe recommend that you upgrade your wireshark packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.", "edition": 17, "cvss3": {"score": 5.9, "vector": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2016-06-01T00:00:00", "title": "Debian DLA-497-1 : wireshark security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-1576", "CVE-2016-4082", "CVE-2012-6054", "CVE-2013-6339", "CVE-2013-4079", "CVE-2013-4931", "CVE-2013-1580", "CVE-2016-4081", "CVE-2013-1574", "CVE-2013-2476", "CVE-2013-1581", "CVE-2012-6057", "CVE-2012-6053", "CVE-2013-2479", "CVE-2013-4927", "CVE-2013-1573", "CVE-2013-7112", "CVE-2012-6060", "CVE-2016-4079", "CVE-2015-6243", "CVE-2015-6246", "CVE-2013-1577", "CVE-2016-4085", "CVE-2012-6055", "CVE-2012-6058", "CVE-2013-1572", "CVE-2012-6056", "CVE-2013-2482", "CVE-2013-1578", "CVE-2012-6052", "CVE-2012-6061", "CVE-2013-2487", "CVE-2012-6062", "CVE-2013-2486", "CVE-2013-4929", "CVE-2013-2485", "CVE-2013-5719", "CVE-2016-4006", "CVE-2015-6248", "CVE-2016-4080", "CVE-2013-1579", "CVE-2013-4080", "CVE-2012-6059", "CVE-2013-1575", "CVE-2013-5721"], "modified": "2016-06-01T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:wireshark-doc", "p-cpe:/a:debian:debian_linux:libwireshark-dev", "p-cpe:/a:debian:debian_linux:wireshark", "p-cpe:/a:debian:debian_linux:libwireshark-data", "p-cpe:/a:debian:debian_linux:libwiretap-dev", "p-cpe:/a:debian:debian_linux:libwsutil-dev", "p-cpe:/a:debian:debian_linux:wireshark-dbg", "cpe:/o:debian:debian_linux:7.0", "p-cpe:/a:debian:debian_linux:libwsutil2", "p-cpe:/a:debian:debian_linux:libwireshark2", "p-cpe:/a:debian:debian_linux:libwiretap2", "p-cpe:/a:debian:debian_linux:wireshark-common", "p-cpe:/a:debian:debian_linux:wireshark-dev", "p-cpe:/a:debian:debian_linux:tshark"], "id": "DEBIAN_DLA-497.NASL", "href": "https://www.tenable.com/plugins/nessus/91395", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-497-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(91395);\n script_version(\"2.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2012-6052\", \"CVE-2012-6053\", \"CVE-2012-6054\", \"CVE-2012-6055\", \"CVE-2012-6056\", \"CVE-2012-6057\", \"CVE-2012-6058\", \"CVE-2012-6059\", \"CVE-2012-6060\", \"CVE-2012-6061\", \"CVE-2012-6062\", \"CVE-2013-1572\", \"CVE-2013-1573\", \"CVE-2013-1574\", \"CVE-2013-1575\", \"CVE-2013-1576\", \"CVE-2013-1577\", \"CVE-2013-1578\", \"CVE-2013-1579\", \"CVE-2013-1580\", \"CVE-2013-1581\", \"CVE-2013-2476\", \"CVE-2013-2479\", \"CVE-2013-2482\", \"CVE-2013-2485\", \"CVE-2013-2486\", \"CVE-2013-2487\", \"CVE-2013-4079\", \"CVE-2013-4080\", \"CVE-2013-4927\", \"CVE-2013-4929\", \"CVE-2013-4931\", \"CVE-2013-5719\", \"CVE-2013-5721\", \"CVE-2013-6339\", \"CVE-2013-7112\", \"CVE-2015-6243\", \"CVE-2015-6246\", \"CVE-2015-6248\", \"CVE-2016-4006\", \"CVE-2016-4079\", \"CVE-2016-4080\", \"CVE-2016-4081\", \"CVE-2016-4082\", \"CVE-2016-4085\");\n script_bugtraq_id(56729, 57616, 58350, 58353, 58358, 58362, 58363, 58364, 60448, 60498, 60503, 61471, 62318, 62320, 63501, 64411);\n\n script_name(english:\"Debian DLA-497-1 : wireshark security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities were discovered in the dissectors/parsers for\nPKTC, IAX2, GSM CBCH and NCP which could result in denial of service.\n\nThis update also fixes many older less important issues by updating\nthe package to the version found in Debian 8 also known as Jessie.\n\nFor Debian 7 'Wheezy', these problems have been fixed in version\n1.12.1+g01b65bf-4+deb8u6~deb7u1.\n\nWe recommend that you upgrade your wireshark packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2016/05/msg00051.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/wireshark\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwireshark-data\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwireshark-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwireshark2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwiretap-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwiretap2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwsutil-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwsutil2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:tshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/12/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/05/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/06/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark-data\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark2\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwiretap-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwiretap2\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwsutil-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwsutil2\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"tshark\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-common\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-dbg\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-doc\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "kaspersky": [{"lastseen": "2020-09-02T11:52:45", "bulletinFamily": "info", "cvelist": ["CVE-2016-4076", "CVE-2016-4082", "CVE-2016-4081", "CVE-2016-4084", "CVE-2016-4077", "CVE-2016-4079", "CVE-2016-4085", "CVE-2016-4083", "CVE-2016-4006", "CVE-2016-4080", "CVE-2016-4078"], "description": "### *Detect date*:\n04/25/2016\n\n### *Severity*:\nWarning\n\n### *Description*:\nMultiple vulnerabilities were found in Wireshark. By exploiting these vulnerabilities malicious users can cause denial of service. These vulnerabilities can be exploited remotely by injecting malformed packet.\n\n### *Affected products*:\nWireshark 1.12 versions earlier than 1.12.11. \nWireshark 2.0 versions earlier than 2.0.3 \nWireshark 1.12 versions earlier than 1.12.11. \nWireshark 2.0 versions earlier than 2.0.3\n\n### *Solution*:\nUpdate to the latest version \n[Download Wireshark](<https://www.wireshark.org/#download>)\n\n### *Original advisories*:\n[Wireshark Security Advisories](<https://www.wireshark.org/security/>) \n\n\n### *Impacts*:\nDoS \n\n### *Related products*:\n[Wireshark](<https://threats.kaspersky.com/en/product/Wireshark/>)\n\n### *CVE-IDS*:\n[CVE-2016-4085](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4085>)4.3Warning \n[CVE-2016-4084](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4084>)4.3Warning \n[CVE-2016-4083](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4083>)4.3Warning \n[CVE-2016-4082](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4082>)4.3Warning \n[CVE-2016-4081](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4081>)4.3Warning \n[CVE-2016-4080](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4080>)4.3Warning \n[CVE-2016-4079](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4079>)4.3Warning \n[CVE-2016-4078](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4078>)4.3Warning \n[CVE-2016-4077](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4077>)4.3Warning \n[CVE-2016-4076](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4076>)4.3Warning \n[CVE-2016-4006](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4006>)4.3Warning", "edition": 41, "modified": "2020-05-22T00:00:00", "published": "2016-04-25T00:00:00", "id": "KLA10796", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10796", "title": "\r KLA10796Multiple vulnerabilities in Wireshark ", "type": "kaspersky", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "f5": [{"lastseen": "2016-11-09T00:09:59", "bulletinFamily": "software", "cvelist": ["CVE-2015-8717", "CVE-2015-8730", "CVE-2015-8714", "CVE-2015-8733", "CVE-2016-4081", "CVE-2016-4079", "CVE-2015-8723", "CVE-2015-8720", "CVE-2016-4085", "CVE-2015-8725", "CVE-2015-8729", "CVE-2015-8721", "CVE-2016-4006", "CVE-2016-4080", "CVE-2016-2523", "CVE-2016-4078", "CVE-2015-8716", "CVE-2015-8711", "CVE-2015-8718"], "edition": 1, "description": "Vulnerability Recommended Actions\n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\nTo mitigate this vulnerability, avoid using Wireshark (tshark) on the BIG-IP system. For troubleshooting purposes, the **tcpdump** utility can be safely used.\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents\n * SOL4602: Overview of the F5 security vulnerability response policy\n * SOL4918: Overview of the F5 critical issue hotfix policy\n * SOL167: Downloading software and firmware from F5\n * SOL13123: Managing BIG-IP product hotfixes (11.x - 12.x)\n * SOL9502: BIG-IP hotfix matrix\n * SOL15106: Managing BIG-IQ product hotfixes\n * SOL15113: BIG-IQ hotfix matrix\n * SOL12766: ARX hotfix matrix\n", "modified": "2016-10-07T00:00:00", "published": "2016-06-24T00:00:00", "id": "SOL01837042", "href": "http://support.f5.com/kb/en-us/solutions/public/k/01/sol01837042.html", "type": "f5", "title": "SOL01837042 - Multiple Wireshark (tshark) vulnerabilities", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-05-31T18:43:14", "bulletinFamily": "software", "cvelist": ["CVE-2015-8717", "CVE-2015-8730", "CVE-2015-8714", "CVE-2015-8733", "CVE-2016-4081", "CVE-2016-4079", "CVE-2015-8723", "CVE-2015-8720", "CVE-2016-4085", "CVE-2015-8725", "CVE-2015-8729", "CVE-2015-8721", "CVE-2016-4006", "CVE-2016-4080", "CVE-2016-2523", "CVE-2016-4078", "CVE-2015-8716", "CVE-2015-8711", "CVE-2015-8718"], "description": "\nF5 Product Development has assigned ID 597176 (BIG-IP) and ID 600847 (ARX) to this vulnerability.\n\nTo determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:\n\nProduct | Versions known to be vulnerable | Versions known to be not vulnerable | Severity | Vulnerable component or feature \n---|---|---|---|--- \nBIG-IP LTM | 13.0.0 \n12.0.0 - 12.1.2 \n11.4.0 - 11.6.2 | 13.1.0 \n12.1.3 \n11.2.1 \n10.2.1 - 10.2.4 | Medium | Wireshark (tshark) \nBIG-IP AAM | 13.0.0 \n12.0.0 - 12.1.2 \n11.4.0 - 11.6.2 | 13.1.0 \n12.1.3 | Medium | Wireshark (tshark) \nBIG-IP AFM | 13.0.0 \n12.0.0 - 12.1.2 \n11.4.0 - 11.6.2 | 13.1.0 \n12.1.3 | Medium | Wireshark (tshark) \nBIG-IP Analytics | 13.0.0 \n12.0.0 - 12.1.2 \n11.4.0 - 11.6.2 | 13.1.0 \n12.1.3 \n11.2.1 | Medium | Wireshark (tshark) \nBIG-IP APM | 13.0.0 \n12.0.0 - 12.1.2 \n11.4.0 - 11.6.2 | 13.1.0 \n12.1.3 \n11.2.1 \n10.2.1 - 10.2.4 | Medium | Wireshark (tshark) \nBIG-IP ASM | 13.0.0 \n12.0.0 - 12.1.2 \n11.4.0 - 11.6.2 | 13.1.0 \n12.1.3 \n11.2.1 \n10.2.1 - 10.2.4 | Medium | Wireshark (tshark) \nBIG-IP DNS | 13.0.0 \n12.0.0 - 12.1.2 | 13.1.0 \n12.1.3 | Medium | Wireshark (tshark) \nBIG-IP Edge Gateway | None | 11.2.1 \n10.2.1 - 10.2.4 | Not vulnerable | None \nBIG-IP GTM | 11.4.0 - 11.6.2 | 11.2.1 \n10.2.1 - 10.2.4 | Medium | Wireshark (tshark) \nBIG-IP Link Controller | 13.0.0 \n12.0.0 - 12.1.2 \n11.4.0 - 11.6.2 | 13.1.0 \n12.1.3 \n11.2.1 \n10.2.1 - 10.2.4 | Medium | Wireshark (tshark) \nBIG-IP PEM | 13.0.0 \n12.0.0 - 12.1.2 \n11.4.0 - 11.6.2 | 13.1.0 \n12.1.3 | Medium | Wireshark (tshark) \nBIG-IP PSM | 11.4.0 - 11.4.1 | 10.2.1 - 10.2.4 | Medium | Wireshark (tshark) \nBIG-IP WebAccelerator | None | 11.2.1 \n10.2.1 - 10.2.4 | Not vulnerable | None \nBIG-IP WOM | None | 11.2.1 \n10.2.1 - 10.2.4 | Not vulnerable | None \nARX | 6.2.0 - 6.4.0 | None | Low | Wireshark (tshark) \nEnterprise Manager | 3.1.1 | None | Medium | Wireshark (tshark) \nFirePass | None | 7.0.0 | Not vulnerable | None \nBIG-IQ Cloud | 4.0.0 - 4.5.0 | None | Medium | Wireshark (tshark) \nBIG-IQ Device | 4.2.0 - 4.5.0 | None | Medium | Wireshark (tshark) \nBIG-IQ Security | 4.0.0 - 4.5.0 | None | Medium | Wireshark (tshark) \nBIG-IQ ADC | 4.5.0 | None | Medium | Wireshark (tshark) \nBIG-IQ Centralized Management | 5.0.0 | None | Medium | Wireshark (tshark) \nBIG-IQ Cloud and Orchestration | 1.0.0 | None | Medium | Wireshark (tshark) \nF5 iWorkflow | 2.0.0 | None | Medium | Wireshark (tshark) \nLineRate | None | 2.5.0 - 2.6.1 | Not vulnerable | None \nF5 MobileSafe | None | 1.0.0 | Not vulnerable | None \nF5 WebSafe | None | 1.0.0 | Not vulnerable | None \nTraffix SDC | None | 5.0.0 \n4.0.0 - 4.4.0 | Not vulnerable | None\n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\nTo mitigate this vulnerability, avoid using Wireshark (tshark) on the BIG-IP system. For troubleshooting purposes, the **tcpdump** utility can be safely used.\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n * [K167: Downloading software and firmware from F5](<https://support.f5.com/csp/article/K167>)\n * [K13123: Managing BIG-IP product hotfixes (11.x - 13.x)](<https://support.f5.com/csp/article/K13123>)\n * [K9502: BIG-IP hotfix matrix](<https://support.f5.com/csp/article/K9502>)\n * [K15106: Managing BIG-IQ product hotfixes](<https://support.f5.com/csp/article/K15106>)\n * [K15113: BIG-IQ hotfix matrix](<https://support.f5.com/csp/article/K15113>)\n * [K12766: ARX hotfix matrix](<https://support.f5.com/csp/article/K12766>)\n", "edition": 1, "modified": "2017-12-20T21:32:00", "published": "2016-06-25T00:18:00", "id": "F5:K01837042", "href": "https://support.f5.com/csp/article/K01837042", "title": "Multiple Wireshark (tshark) vulnerabilities", "type": "f5", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}]}