KLA11151Denial of service vulnerabilities in Wireshark
2017-11-30T00:00:00
ID KLA11151 Type kaspersky Reporter Kaspersky Lab Modified 2020-06-18T00:00:00
Description
Detect date:
11/30/2017
Severity:
Warning
Description:
Multiple vulnerabilities have been found in Wireshark. Malicious users can exploit these vulnerabilities remotely to cause a denial of service via injecting a malformed packet.
Affected products:
Wireshark versions from 2.4.0 to 2.4.2 and versions from 2.2.0 to 2.2.10
The following public exploits exists for this vulnerability:
{"id": "KLA11151", "bulletinFamily": "info", "title": "\r KLA11151Denial of service vulnerabilities in Wireshark ", "description": "### *Detect date*:\n11/30/2017\n\n### *Severity*:\nWarning\n\n### *Description*:\nMultiple vulnerabilities have been found in Wireshark. Malicious users can exploit these vulnerabilities remotely to cause a denial of service via injecting a malformed packet.\n\n### *Affected products*:\nWireshark versions from 2.4.0 to 2.4.2 and versions from 2.2.0 to 2.2.10\n\n### *Solution*:\nUpdate to the latest version \n[Get Wireshark](<https://www.wireshark.org/download.html>)\n\n### *Original advisories*:\n[Wireshark security advisory](<https://www.wireshark.org/security/wnpa-sec-2017-47.html>) \n[Wireshark security advisory](<https://www.wireshark.org/security/wnpa-sec-2017-48.html>) \n[Wireshark security advisory](<https://www.wireshark.org/security/wnpa-sec-2017-49.html>) \n\n\n### *Impacts*:\nDoS \n\n### *Related products*:\n[Wireshark](<https://threats.kaspersky.com/en/product/Wireshark/>)\n\n### *CVE-IDS*:\n[CVE-2017-17085](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17085>)5.0Critical \n[CVE-2017-17083](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17083>)5.0Critical \n[CVE-2017-17084](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17084>)5.0Critical\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:", "published": "2017-11-30T00:00:00", "modified": "2020-06-18T00:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "href": "https://threats.kaspersky.com/en/vulnerability/KLA11151", "reporter": "Kaspersky Lab", "references": [], "cvelist": ["CVE-2017-17084", "CVE-2017-17085", "CVE-2017-17083"], "type": "kaspersky", "lastseen": "2020-09-02T11:47:05", "edition": 41, "viewCount": 9, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2017-17083", "CVE-2017-17084", "CVE-2017-17085"]}, {"type": "freebsd", "idList": ["4B228E69-22E1-4019-AFD0-8AA716D0EC0B"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310812259", "OPENVAS:1361412562310812260", "OPENVAS:1361412562311220192425", "OPENVAS:1361412562310874649", "OPENVAS:1361412562310704060", "OPENVAS:1361412562310873992", "OPENVAS:1361412562310874872"]}, {"type": "nessus", "idList": ["SUSE_SU-2017-3436-1.NASL", "FREEBSD_PKG_4B228E6922E14019AFD08AA716D0EC0B.NASL", "EULEROS_SA-2019-2425.NASL", "DEBIAN_DSA-4060.NASL", "DEBIAN_DLA-1226.NASL", "SUSE_SU-2018-0054-1.NASL", "FEDORA_2017-3997279E65.NASL", "WIRESHARK_2_4_3.NASL", "MACOSX_WIRESHARK_2_4_3.NASL", "OPENSUSE-2017-1337.NASL"]}, {"type": "fedora", "idList": ["FEDORA:C67E26076F65", "FEDORA:A3BB5642EA04", "FEDORA:AA87961AC333"]}, {"type": "debian", "idList": ["DEBIAN:DSA-4060-1:D5D23", "DEBIAN:DLA-1226-1:264C9"]}, {"type": "exploitdb", "idList": ["EDB-ID:43233"]}, {"type": "zdt", "idList": ["1337DAY-ID-29142"]}], "modified": "2020-09-02T11:47:05", "rev": 2}, "score": {"value": 5.0, "vector": "NONE", "modified": "2020-09-02T11:47:05", "rev": 2}, "vulnersScore": 5.0}, "scheme": null}
{"cve": [{"lastseen": "2020-10-03T13:07:38", "description": "In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the NetBIOS dissector could crash. This was addressed in epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning of a buffer.", "edition": 3, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2017-12-01T08:29:00", "title": "CVE-2017-17083", "type": "cve", "cwe": ["CWE-754"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-17083"], "modified": "2018-02-04T02:29:00", "cpe": ["cpe:/a:wireshark:wireshark:2.2.5", "cpe:/a:wireshark:wireshark:2.2.9", "cpe:/a:wireshark:wireshark:2.2.3", "cpe:/o:debian:debian_linux:8.0", "cpe:/a:wireshark:wireshark:2.2.0", "cpe:/a:wireshark:wireshark:2.2.6", "cpe:/a:wireshark:wireshark:2.4.1", "cpe:/a:wireshark:wireshark:2.4.2", "cpe:/a:wireshark:wireshark:2.4.0", "cpe:/a:wireshark:wireshark:2.2.8", "cpe:/a:wireshark:wireshark:2.2.4", "cpe:/a:wireshark:wireshark:2.2.10", "cpe:/a:wireshark:wireshark:2.2.1", "cpe:/a:wireshark:wireshark:2.2.7", "cpe:/a:wireshark:wireshark:2.2.2", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2017-17083", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17083", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.4:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T13:07:38", "description": "In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the IWARP_MPA dissector could crash. This was addressed in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU length.", "edition": 3, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2017-12-01T08:29:00", "title": "CVE-2017-17084", "type": "cve", "cwe": ["CWE-754"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-17084"], "modified": "2018-02-04T02:29:00", "cpe": ["cpe:/a:wireshark:wireshark:2.2.5", "cpe:/a:wireshark:wireshark:2.2.9", "cpe:/a:wireshark:wireshark:2.2.3", "cpe:/o:debian:debian_linux:8.0", "cpe:/a:wireshark:wireshark:2.2.0", "cpe:/a:wireshark:wireshark:2.2.6", "cpe:/a:wireshark:wireshark:2.4.1", "cpe:/a:wireshark:wireshark:2.4.2", "cpe:/a:wireshark:wireshark:2.4.0", "cpe:/a:wireshark:wireshark:2.2.8", "cpe:/a:wireshark:wireshark:2.2.4", "cpe:/a:wireshark:wireshark:2.2.10", "cpe:/a:wireshark:wireshark:2.2.1", "cpe:/a:wireshark:wireshark:2.2.7", "cpe:/a:wireshark:wireshark:2.2.2", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2017-17084", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17084", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.4:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T13:07:38", "description": "In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c by validating the packet length.", "edition": 3, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2017-12-01T08:29:00", "title": "CVE-2017-17085", "type": "cve", "cwe": ["CWE-754"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-17085"], "modified": "2018-02-04T02:29:00", "cpe": ["cpe:/a:wireshark:wireshark:2.2.5", "cpe:/a:wireshark:wireshark:2.2.9", "cpe:/a:wireshark:wireshark:2.2.3", "cpe:/o:debian:debian_linux:8.0", "cpe:/a:wireshark:wireshark:2.2.0", "cpe:/a:wireshark:wireshark:2.2.6", "cpe:/a:wireshark:wireshark:2.4.1", "cpe:/a:wireshark:wireshark:2.4.2", "cpe:/a:wireshark:wireshark:2.4.0", "cpe:/a:wireshark:wireshark:2.2.8", "cpe:/a:wireshark:wireshark:2.2.4", "cpe:/a:wireshark:wireshark:2.2.10", "cpe:/a:wireshark:wireshark:2.2.1", "cpe:/a:wireshark:wireshark:2.2.7", "cpe:/a:wireshark:wireshark:2.2.2", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2017-17085", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17085", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.4:*:*:*:*:*:*:*"]}], "fedora": [{"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-17083", "CVE-2017-17084", "CVE-2017-17085"], "description": "Metapackage with installs wireshark-cli and wireshark-qt. ", "modified": "2018-01-10T02:13:58", "published": "2018-01-10T02:13:58", "id": "FEDORA:C67E26076F65", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: wireshark-2.4.3-1.fc27", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-13764", "CVE-2017-13765", "CVE-2017-13766", "CVE-2017-15189", "CVE-2017-15190", "CVE-2017-15191", "CVE-2017-15193", "CVE-2017-17083", "CVE-2017-17084", "CVE-2017-17085", "CVE-2017-17935", "CVE-2017-6014", "CVE-2017-9617", "CVE-2017-9766", "CVE-2018-14339", "CVE-2018-14340", "CVE-2018-14341", "CVE-2018-14342", "CVE-2018-14343", "CVE-2018-14344", "CVE-2018-14367", "CVE-2018-14368", "CVE-2018-14369", "CVE-2018-14370", "CVE-2018-5334", "CVE-2018-5335", "CVE-2018-6836", "CVE-2018-7320", "CVE-2018-7334", "CVE-2018-7336", "CVE-2018-7337", "CVE-2018-7417", "CVE-2018-7418", "CVE-2018-7419"], "description": "Metapackage with installs wireshark-cli and wireshark-qt. ", "modified": "2018-08-01T17:56:04", "published": "2018-08-01T17:56:04", "id": "FEDORA:A3BB5642EA04", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: wireshark-2.6.2-1.fc27", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-13764", "CVE-2017-13765", "CVE-2017-13766", "CVE-2017-15189", "CVE-2017-15190", "CVE-2017-15191", "CVE-2017-15193", "CVE-2017-17083", "CVE-2017-17084", "CVE-2017-17085", "CVE-2017-17935", "CVE-2017-6014", "CVE-2017-9617", "CVE-2017-9766", "CVE-2018-11354", "CVE-2018-11355", "CVE-2018-11356", "CVE-2018-11357", "CVE-2018-11358", "CVE-2018-11359", "CVE-2018-11360", "CVE-2018-11361", "CVE-2018-11362", "CVE-2018-5334", "CVE-2018-5335", "CVE-2018-6836", "CVE-2018-7320", "CVE-2018-7334", "CVE-2018-7336", "CVE-2018-7337", "CVE-2018-7417", "CVE-2018-7418", "CVE-2018-7419"], "description": "Metapackage with installs wireshark-cli and wireshark-qt. ", "modified": "2018-06-05T14:11:28", "published": "2018-06-05T14:11:28", "id": "FEDORA:AA87961AC333", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: wireshark-2.6.1-1.fc27", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "openvas": [{"lastseen": "2019-05-29T18:34:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-17084", "CVE-2017-17085", "CVE-2017-17083"], "description": "This host is installed with Wireshark\n and is prone to multiple denial of service vulnerabilities.", "modified": "2019-05-17T00:00:00", "published": "2017-12-15T00:00:00", "id": "OPENVAS:1361412562310812259", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812259", "type": "openvas", "title": "Wireshark Security Updates (wnpa-sec-2017-49_wnpa-sec-2017-47)-Windows", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Wireshark Security Updates (wnpa-sec-2017-49_wnpa-sec-2017-47)-Windows\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:wireshark:wireshark\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812259\");\n script_version(\"2019-05-17T13:14:58+0000\");\n script_cve_id(\"CVE-2017-17083\", \"CVE-2017-17084\", \"CVE-2017-17085\");\n script_bugtraq_id(102029, 102030, 102071);\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-05-17 13:14:58 +0000 (Fri, 17 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-12-15 11:37:23 +0530 (Fri, 15 Dec 2017)\");\n script_name(\"Wireshark Security Updates (wnpa-sec-2017-49_wnpa-sec-2017-47)-Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Wireshark\n and is prone to multiple denial of service vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to multiple errors\n in 'NetBIOS', 'IWARP_MPA' and 'CIP Safety' dissectors, which fails to properly\n handle certain types of packets.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow remote attackers to crash the affected application,\n denying service to legitimate users.\");\n\n script_tag(name:\"affected\", value:\"Wireshark version 2.4.0 to 2.4.2, 2.2.0\n to 2.2.10 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Wireshark version 2.4.3 or\n 2.2.11 or later.\");\n\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-47.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-48.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-49.html\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_wireshark_detect_win.nasl\");\n script_mandatory_keys(\"Wireshark/Win/Ver\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE )) exit(0);\nwirversion = infos['version'];\npath = infos['location'];\n\nif(wirversion =~ \"^2\\.[24]\\.\")\n{\n if(version_in_range(version:wirversion, test_version:\"2.4.0\", test_version2:\"2.4.2\")){\n fix = \"2.4.3\";\n }\n\n else if(version_in_range(version:wirversion, test_version:\"2.2.0\", test_version2:\"2.2.10\")){\n fix = \"2.2.11\";\n }\n\n if(fix)\n {\n report = report_fixed_ver(installed_version:wirversion, fixed_version:fix, install_path:path);\n security_message(data:report);\n exit(0);\n }\n}\nexit(0);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:33:07", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-17084", "CVE-2017-17085", "CVE-2017-17083"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-01-10T00:00:00", "id": "OPENVAS:1361412562310873992", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310873992", "type": "openvas", "title": "Fedora Update for wireshark FEDORA-2017-3997279e65", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2017_3997279e65_wireshark_fc27.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for wireshark FEDORA-2017-3997279e65\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.873992\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-01-10 07:43:02 +0100 (Wed, 10 Jan 2018)\");\n script_cve_id(\"CVE-2017-17084\", \"CVE-2017-17083\", \"CVE-2017-17085\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for wireshark FEDORA-2017-3997279e65\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'wireshark'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"wireshark on Fedora 27\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"FEDORA\", value:\"2017-3997279e65\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGZJZIDRQVAIS6JRMNTVMO75TXRTF4HA\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC27\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"wireshark\", rpm:\"wireshark~2.4.3~1.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:34:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-17084", "CVE-2017-17085", "CVE-2017-17083"], "description": "This host is installed with Wireshark\n and is prone to multiple denial of service vulnerabilities.", "modified": "2019-05-17T00:00:00", "published": "2017-12-15T00:00:00", "id": "OPENVAS:1361412562310812260", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812260", "type": "openvas", "title": "Wireshark Security Updates (wnpa-sec-2017-49_wnpa-sec-2017-47)-MACOSX", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Wireshark Security Updates (wnpa-sec-2017-49_wnpa-sec-2017-47)-MACOSX\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:wireshark:wireshark\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812260\");\n script_version(\"2019-05-17T10:45:27+0000\");\n script_cve_id(\"CVE-2017-17083\", \"CVE-2017-17084\", \"CVE-2017-17085\");\n script_bugtraq_id(102029, 102030, 102071);\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-05-17 10:45:27 +0000 (Fri, 17 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-12-15 11:37:23 +0530 (Fri, 15 Dec 2017)\");\n script_name(\"Wireshark Security Updates (wnpa-sec-2017-49_wnpa-sec-2017-47)-MACOSX\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Wireshark\n and is prone to multiple denial of service vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to multiple errors\n in 'NetBIOS', 'IWARP_MPA' and 'CIP Safety' dissectors, which fails to properly\n handle certain types of packets.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow remote attackers to crash the affected application,\n denying service to legitimate users.\");\n\n script_tag(name:\"affected\", value:\"Wireshark version 2.4.0 to 2.4.2, 2.2.0\n to 2.2.10 on MACOSX.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Wireshark version 2.4.3 or\n 2.2.11 or later.\");\n\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-47.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-48.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-49.html\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_wireshark_detect_macosx.nasl\");\n script_mandatory_keys(\"Wireshark/MacOSX/Version\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nwirversion = \"\";\npath = \"\";\ninfos = \"\";\n\nif(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE )) exit(0);\nwirversion = infos['version'];\npath = infos['location'];\n\nif(wirversion =~ \"^(2\\.(2|4))\")\n{\n if(version_in_range(version:wirversion, test_version:\"2.4.0\", test_version2:\"2.4.2\")){\n fix = \"2.4.3\";\n }\n\n else if(version_in_range(version:wirversion, test_version:\"2.2.0\", test_version2:\"2.2.10\")){\n fix = \"2.2.11\";\n }\n\n if(fix)\n {\n report = report_fixed_ver(installed_version:wirversion, fixed_version:fix, install_path:path);\n security_message(data:report);\n exit(0);\n }\n}\nexit(0);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-07-04T19:02:19", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-17084", "CVE-2017-11408", "CVE-2017-17085", "CVE-2017-13766", "CVE-2017-17083"], "description": "It was discovered that wireshark, a network protocol analyzer, contained\nseveral vulnerabilities in the dissectors for CIP Safety, IWARP_MPA,\nNetBIOS, Profinet I/O and AMQP, which result in denial of dervice or the\nexecution of arbitrary code.", "modified": "2019-07-04T00:00:00", "published": "2017-12-09T00:00:00", "id": "OPENVAS:1361412562310704060", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704060", "type": "openvas", "title": "Debian Security Advisory DSA 4060-1 (wireshark - security update)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Auto-generated from advisory DSA 4060-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704060\");\n script_version(\"2019-07-04T09:25:28+0000\");\n script_cve_id(\"CVE-2017-11408\", \"CVE-2017-13766\", \"CVE-2017-17083\", \"CVE-2017-17084\", \"CVE-2017-17085\");\n script_name(\"Debian Security Advisory DSA 4060-1 (wireshark - security update)\");\n script_tag(name:\"last_modification\", value:\"2019-07-04 09:25:28 +0000 (Thu, 04 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-12-09 00:00:00 +0100 (Sat, 09 Dec 2017)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2017/dsa-4060.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(8|9)\");\n script_tag(name:\"affected\", value:\"wireshark on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the oldstable distribution (jessie), these problems have been fixed\nin version 1.12.1+g01b65bf-4+deb8u12.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 2.2.6+g32dac6a-2+deb9u1.\n\nWe recommend that you upgrade your wireshark packages.\");\n\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/wireshark\");\n script_tag(name:\"summary\", value:\"It was discovered that wireshark, a network protocol analyzer, contained\nseveral vulnerabilities in the dissectors for CIP Safety, IWARP_MPA,\nNetBIOS, Profinet I/O and AMQP, which result in denial of dervice or the\nexecution of arbitrary code.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"1.12.1+g01b65bf-4+deb8u12\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u12\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libwireshark5\", ver:\"1.12.1+g01b65bf-4+deb8u12\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"1.12.1+g01b65bf-4+deb8u12\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libwiretap4\", ver:\"1.12.1+g01b65bf-4+deb8u12\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"1.12.1+g01b65bf-4+deb8u12\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libwsutil4\", ver:\"1.12.1+g01b65bf-4+deb8u12\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"tshark\", ver:\"1.12.1+g01b65bf-4+deb8u12\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"wireshark\", ver:\"1.12.1+g01b65bf-4+deb8u12\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"1.12.1+g01b65bf-4+deb8u12\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"wireshark-dbg\", ver:\"1.12.1+g01b65bf-4+deb8u12\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u12\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"1.12.1+g01b65bf-4+deb8u12\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"1.12.1+g01b65bf-4+deb8u12\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"2.2.6+g32dac6a-2+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"2.2.6+g32dac6a-2+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libwireshark8\", ver:\"2.2.6+g32dac6a-2+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"2.2.6+g32dac6a-2+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libwiretap6\", ver:\"2.2.6+g32dac6a-2+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libwscodecs1\", ver:\"2.2.6+g32dac6a-2+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"2.2.6+g32dac6a-2+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libwsutil7\", ver:\"2.2.6+g32dac6a-2+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"tshark\", ver:\"2.2.6+g32dac6a-2+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"wireshark\", ver:\"2.2.6+g32dac6a-2+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"2.2.6+g32dac6a-2+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"2.2.6+g32dac6a-2+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"2.2.6+g32dac6a-2+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"wireshark-gtk\", ver:\"2.2.6+g32dac6a-2+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"2.2.6+g32dac6a-2+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:32:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-11354", "CVE-2018-7335", "CVE-2017-17084", "CVE-2018-7336", "CVE-2018-5335", "CVE-2018-11357", "CVE-2018-7419", "CVE-2018-11359", "CVE-2018-11361", "CVE-2018-11358", "CVE-2017-9617", "CVE-2018-11362", "CVE-2018-7320", "CVE-2018-7417", "CVE-2017-6014", "CVE-2017-17935", "CVE-2018-7418", "CVE-2017-17085", "CVE-2018-5334", "CVE-2017-15189", "CVE-2017-15191", "CVE-2017-13764", "CVE-2017-15190", "CVE-2018-7420", "CVE-2018-11360", "CVE-2017-13765", "CVE-2018-6836", "CVE-2017-9766", "CVE-2018-11356", "CVE-2018-7334", "CVE-2017-15192", "CVE-2017-13766", "CVE-2018-7337", "CVE-2017-15193", "CVE-2017-13767", "CVE-2017-9616", "CVE-2018-11355", "CVE-2017-17083"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-06-06T00:00:00", "id": "OPENVAS:1361412562310874649", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874649", "type": "openvas", "title": "Fedora Update for wireshark FEDORA-2018-d1cfa444d2", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_d1cfa444d2_wireshark_fc27.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for wireshark FEDORA-2018-d1cfa444d2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874649\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-06-06 10:25:48 +0200 (Wed, 06 Jun 2018)\");\n script_cve_id(\"CVE-2018-7419\", \"CVE-2018-7418\", \"CVE-2018-7417\", \"CVE-2018-7420\",\n \"CVE-2018-7320\", \"CVE-2018-7336\", \"CVE-2018-7337\", \"CVE-2018-7334\",\n \"CVE-2018-7335\", \"CVE-2018-6836\", \"CVE-2018-5335\", \"CVE-2018-5334\",\n \"CVE-2017-6014\", \"CVE-2017-9616\", \"CVE-2017-9617\", \"CVE-2017-9766\",\n \"CVE-2017-17935\", \"CVE-2017-17085\", \"CVE-2017-17084\", \"CVE-2017-17083\",\n \"CVE-2017-15189\", \"CVE-2017-15190\", \"CVE-2017-15191\", \"CVE-2017-15192\",\n \"CVE-2017-15193\", \"CVE-2017-13764\", \"CVE-2017-13765\", \"CVE-2017-13766\",\n \"CVE-2017-13767\", \"CVE-2018-11362\", \"CVE-2018-11361\", \"CVE-2018-11360\",\n \"CVE-2018-11359\", \"CVE-2018-11358\", \"CVE-2018-11357\", \"CVE-2018-11356\",\n \"CVE-2018-11355\", \"CVE-2018-11354\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for wireshark FEDORA-2018-d1cfa444d2\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'wireshark'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\non the target host.\");\n script_tag(name:\"affected\", value:\"wireshark on Fedora 27\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"FEDORA\", value:\"2018-d1cfa444d2\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S4TES6EYI77P55Y77OPJQCCKJKZ7EQBY\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC27\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"wireshark\", rpm:\"wireshark~2.6.1~1.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:33:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-7335", "CVE-2017-17084", "CVE-2018-14339", "CVE-2018-7336", "CVE-2018-5335", "CVE-2018-7419", "CVE-2018-14343", "CVE-2018-14367", "CVE-2017-9617", "CVE-2018-14341", "CVE-2018-7320", "CVE-2018-7417", "CVE-2017-6014", "CVE-2017-17935", "CVE-2018-7418", "CVE-2018-14344", "CVE-2017-17085", "CVE-2018-5334", "CVE-2017-15189", "CVE-2017-15191", "CVE-2017-13764", "CVE-2017-15190", "CVE-2018-7420", "CVE-2017-13765", "CVE-2018-6836", "CVE-2018-14369", "CVE-2017-9766", "CVE-2018-14370", "CVE-2018-14342", "CVE-2018-14368", "CVE-2018-7334", "CVE-2017-15192", "CVE-2017-13766", "CVE-2018-7337", "CVE-2018-14340", "CVE-2017-15193", "CVE-2017-13767", "CVE-2017-9616", "CVE-2017-17083"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-08-02T00:00:00", "id": "OPENVAS:1361412562310874872", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874872", "type": "openvas", "title": "Fedora Update for wireshark FEDORA-2018-9ef52861b5", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_9ef52861b5_wireshark_fc27.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for wireshark FEDORA-2018-9ef52861b5\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874872\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-08-02 06:01:38 +0200 (Thu, 02 Aug 2018)\");\n script_cve_id(\"CVE-2018-14339\", \"CVE-2018-14340\", \"CVE-2018-14341\", \"CVE-2018-14342\",\n \"CVE-2018-14343\", \"CVE-2018-14344\", \"CVE-2018-14367\", \"CVE-2018-14368\",\n \"CVE-2018-14369\", \"CVE-2018-14370\", \"CVE-2018-7419\", \"CVE-2018-7418\",\n \"CVE-2018-7417\", \"CVE-2018-7420\", \"CVE-2018-7320\", \"CVE-2018-7336\",\n \"CVE-2018-7337\", \"CVE-2018-7334\", \"CVE-2018-7335\", \"CVE-2018-6836\",\n \"CVE-2018-5335\", \"CVE-2018-5334\", \"CVE-2017-6014\", \"CVE-2017-9616\",\n \"CVE-2017-9617\", \"CVE-2017-9766\", \"CVE-2017-17935\", \"CVE-2017-17085\",\n \"CVE-2017-17084\", \"CVE-2017-17083\", \"CVE-2017-15189\", \"CVE-2017-15190\",\n \"CVE-2017-15191\", \"CVE-2017-15192\", \"CVE-2017-15193\", \"CVE-2017-13764\",\n \"CVE-2017-13765\", \"CVE-2017-13766\", \"CVE-2017-13767\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for wireshark FEDORA-2018-9ef52861b5\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'wireshark'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"wireshark on Fedora 27\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"FEDORA\", value:\"2018-9ef52861b5\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM62HSZGLJTWME5BBTQHN5RW6HL3PMPQ\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC27\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"wireshark\", rpm:\"wireshark~2.6.2~1.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-01-27T18:34:20", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-9347", "CVE-2015-8713", "CVE-2015-8717", "CVE-2016-5350", "CVE-2015-8714", "CVE-2016-2531", "CVE-2016-6505", "CVE-2016-2530", "CVE-2016-6510", "CVE-2016-4081", "CVE-2016-7177", "CVE-2015-8719", "CVE-2017-9349", "CVE-2016-7179", "CVE-2016-4077", "CVE-2015-8731", "CVE-2018-19622", "CVE-2018-14341", "CVE-2015-8723", "CVE-2018-7418", "CVE-2016-4085", "CVE-2018-5336", "CVE-2016-6508", "CVE-2016-5353", "CVE-2016-5359", "CVE-2018-16057", "CVE-2017-13765", "CVE-2015-8729", "CVE-2015-8721", "CVE-2016-9375", "CVE-2016-6507", "CVE-2017-9345", "CVE-2016-2532", "CVE-2017-7703", "CVE-2016-7958", "CVE-2015-8712", "CVE-2016-4006", "CVE-2016-2523", "CVE-2018-14340", "CVE-2015-8716", "CVE-2017-9352", "CVE-2015-8718", "CVE-2017-17083"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220192425", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220192425", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for wireshark (EulerOS-SA-2019-2425)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.2425\");\n script_version(\"2020-01-23T15:31:18+0000\");\n script_cve_id(\"CVE-2015-8712\", \"CVE-2015-8713\", \"CVE-2015-8714\", \"CVE-2015-8716\", \"CVE-2015-8717\", \"CVE-2015-8718\", \"CVE-2015-8719\", \"CVE-2015-8721\", \"CVE-2015-8723\", \"CVE-2015-8729\", \"CVE-2015-8731\", \"CVE-2016-2523\", \"CVE-2016-2530\", \"CVE-2016-2531\", \"CVE-2016-2532\", \"CVE-2016-4006\", \"CVE-2016-4077\", \"CVE-2016-4081\", \"CVE-2016-4085\", \"CVE-2016-5350\", \"CVE-2016-5353\", \"CVE-2016-5359\", \"CVE-2016-6505\", \"CVE-2016-6507\", \"CVE-2016-6508\", \"CVE-2016-6510\", \"CVE-2016-7177\", \"CVE-2016-7179\", \"CVE-2016-7958\", \"CVE-2016-9375\", \"CVE-2017-13765\", \"CVE-2017-17083\", \"CVE-2017-7703\", \"CVE-2017-9345\", \"CVE-2017-9347\", \"CVE-2017-9349\", \"CVE-2017-9352\", \"CVE-2018-14340\", \"CVE-2018-14341\", \"CVE-2018-16057\", \"CVE-2018-19622\", \"CVE-2018-5336\", \"CVE-2018-7418\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 15:31:18 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 12:54:39 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for wireshark (EulerOS-SA-2019-2425)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP2\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-2425\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2425\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'wireshark' package(s) announced via the EulerOS-SA-2019-2425 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.(CVE-2018-14340)\n\nIn Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.(CVE-2018-14341)\n\nIn Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB dissectors could crash. This was addressed in epan/tvbparse.c by limiting the recursion depth.(CVE-2018-5336)\n\nIn Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by correcting the extraction of the length value.(CVE-2018-7418)\n\nIn Wireshark 2.2.0 to 2.2.6, the ROS dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/asn1/ros/packet-ros-template.c by validating an OID.(CVE-2017-9347)\n\nIn Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an infinite loop. This was addressed in epan/dissectors/packet-dcm.c by validating a length value.(CVE-2017-9349)\n\nIn Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.(CVE-2018-14340)\n\nIn Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.(CVE-2018-14341)\n\nIn Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the MMSE dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-mmse.c by preventing length overflows.(CVE-2018-19622)\n\nThe dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.(CVE-2015-8714)\n\nIn Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the IrCOMM dissector has a buffer over-read and application crash. This was addressed in plugins/irda/packet-ircomm.c by adding length validation.(CVE-2017-13765)\n\nIn Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the NetBIOS dissector could crash. This was addressed in epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'wireshark' package(s) on Huawei EulerOS V2.0SP2.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP2\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"wireshark\", rpm:\"wireshark~1.10.14~7.h12\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"wireshark-gnome\", rpm:\"wireshark-gnome~1.10.14~7.h12\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "freebsd": [{"lastseen": "2019-05-29T18:32:05", "bulletinFamily": "unix", "cvelist": ["CVE-2017-17084", "CVE-2017-17085", "CVE-2017-17083"], "description": "\nwireshark developers reports:\n\nwnpa-sec-2017-47: The IWARP_MPA dissector could crash. (CVE-2017-17084)\nwnpa-sec-2017-48: The NetBIOS dissector could crash. Discovered by Kamil Frankowicz. (CVE-2017-17083)\nwnpa-sec-2017-49: The CIP Safety dissector could crash. (CVE-2017-17085)\n\n", "edition": 5, "modified": "2017-11-30T00:00:00", "published": "2017-11-30T00:00:00", "id": "4B228E69-22E1-4019-AFD0-8AA716D0EC0B", "href": "https://vuxml.freebsd.org/freebsd/4b228e69-22e1-4019-afd0-8aa716d0ec0b.html", "title": "wireshark -- multiple security issues", "type": "freebsd", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "nessus": [{"lastseen": "2021-01-01T07:00:56", "description": "The version of Wireshark installed on the remote Windows host is \n2.2.x prior to 2.2.11 or 2.4.x prior to 2.4.3. It is, therefore, \naffected by denial of service vulnerabilities in the IWARP_MPA, \nNetBIOS, and CIP Safety dissectors. An unauthenticated, remote \nattacker can exploit this by injecting a malformed packet onto the \nwire or by convincing someone to read a malformed packet trace file.\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.", "edition": 29, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2017-12-01T00:00:00", "title": "Wireshark 2.2.x < 2.2.11 / 2.4.x < 2.4.3 DoS Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-17084", "CVE-2017-17085", "CVE-2017-17083"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:wireshark:wireshark"], "id": "WIRESHARK_2_4_3.NASL", "href": "https://www.tenable.com/plugins/nessus/105007", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(105007);\n script_version(\"3.7\");\n script_cvs_date(\"Date: 2019/11/12\");\n\n script_cve_id(\"CVE-2017-17083\", \"CVE-2017-17084\", \"CVE-2017-17085\");\n\n script_name(english:\"Wireshark 2.2.x < 2.2.11 / 2.4.x < 2.4.3 DoS Vulnerabilities\");\n script_summary(english:\"Checks the version of Wireshark.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"An application installed on the remote Windows host is affected by\nmultiple denial of service vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Wireshark installed on the remote Windows host is \n2.2.x prior to 2.2.11 or 2.4.x prior to 2.4.3. It is, therefore, \naffected by denial of service vulnerabilities in the IWARP_MPA, \nNetBIOS, and CIP Safety dissectors. An unauthenticated, remote \nattacker can exploit this by injecting a malformed packet onto the \nwire or by convincing someone to read a malformed packet trace file.\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-47.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-48.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-49.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Wireshark version 2.2.11 / 2.4.3 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-17085\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/11/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/11/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/12/01\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:wireshark:wireshark\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"wireshark_installed.nasl\");\n script_require_keys(\"installed_sw/Wireshark\", \"SMB/Registry/Enumerated\");\n\n exit(0);\n}\n\ninclude(\"vcf.inc\");\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\n\napp_info = vcf::get_app_info(app:\"Wireshark\", win_local:TRUE);\n\nconstraints = [\n { \"min_version\" : \"2.2.0\", \"fixed_version\" : \"2.2.11\" },\n { \"min_version\" : \"2.4.0\", \"fixed_version\" : \"2.4.3\" }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T03:41:30", "description": "The version of Wireshark installed on the remote MacOS/MacOSX host \nis 2.2.x prior to 2.2.11 or 2.4.x prior to 2.4.3. It is, therefore,\naffected by denial of service vulnerabilities in the IWARP_MPA, \nNetBIOS, and CIP Safety dissectors. An unauthenticated, remote \nattacker can exploit this by injecting a malformed packet onto \nthe wire or by convincing someone to read a malformed packet trace \nfile.\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.", "edition": 28, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2017-12-01T00:00:00", "title": "Wireshark 2.2.x < 2.2.11 / 2.4.x < 2.4.3 DoS Vulnerabilities (MacOS)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-17084", "CVE-2017-17085", "CVE-2017-17083"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:wireshark:wireshark"], "id": "MACOSX_WIRESHARK_2_4_3.NASL", "href": "https://www.tenable.com/plugins/nessus/105008", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(105008);\n script_version(\"3.6\");\n script_cvs_date(\"Date: 2019/11/12\");\n\n script_cve_id(\"CVE-2017-17083\", \"CVE-2017-17084\", \"CVE-2017-17085\");\n\n script_name(english:\"Wireshark 2.2.x < 2.2.11 / 2.4.x < 2.4.3 DoS Vulnerabilities (MacOS)\");\n script_summary(english:\"Checks the version of Wireshark.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"An application installed on the remote MacOS / MacOSX host is affected by\nmultiple denial of service vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Wireshark installed on the remote MacOS/MacOSX host \nis 2.2.x prior to 2.2.11 or 2.4.x prior to 2.4.3. It is, therefore,\naffected by denial of service vulnerabilities in the IWARP_MPA, \nNetBIOS, and CIP Safety dissectors. An unauthenticated, remote \nattacker can exploit this by injecting a malformed packet onto \nthe wire or by convincing someone to read a malformed packet trace \nfile.\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-47.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-48.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-49.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Wireshark version 2.2.11 / 2.4.3 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-17085\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/11/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/11/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/12/01\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:wireshark:wireshark\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_wireshark_installed.nbin\");\n script_require_keys(\"installed_sw/Wireshark\", \"Host/MacOSX/Version\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\ninclude(\"vcf.inc\");\n\nget_kb_item_or_exit(\"Host/MacOSX/Version\");\n\napp_info = vcf::get_app_info(app:\"Wireshark\");\n\nconstraints = [\n { \"min_version\" : \"2.2.0\", \"fixed_version\" : \"2.2.11\" },\n { \"min_version\" : \"2.4.0\", \"fixed_version\" : \"2.4.3\" }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-06T10:50:44", "description": "wireshark developers reports :\n\nwnpa-sec-2017-47: The IWARP_MPA dissector could crash.\n(CVE-2017-17084)\n\nwnpa-sec-2017-48: The NetBIOS dissector could crash. Discovered by\nKamil Frankowicz. (CVE-2017-17083)\n\nwnpa-sec-2017-49: The CIP Safety dissector could crash.\n(CVE-2017-17085)", "edition": 30, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2017-12-11T00:00:00", "title": "FreeBSD : wireshark -- multiple security issues (4b228e69-22e1-4019-afd0-8aa716d0ec0b)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-17084", "CVE-2017-17085", "CVE-2017-17083"], "modified": "2017-12-11T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:wireshark-qt5", "p-cpe:/a:freebsd:freebsd:tshark-lite", "cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:wireshark-lite", "p-cpe:/a:freebsd:freebsd:tshark", "p-cpe:/a:freebsd:freebsd:wireshark"], "id": "FREEBSD_PKG_4B228E6922E14019AFD08AA716D0EC0B.NASL", "href": "https://www.tenable.com/plugins/nessus/105140", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(105140);\n script_version(\"3.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2017-17083\", \"CVE-2017-17084\", \"CVE-2017-17085\");\n\n script_name(english:\"FreeBSD : wireshark -- multiple security issues (4b228e69-22e1-4019-afd0-8aa716d0ec0b)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"wireshark developers reports :\n\nwnpa-sec-2017-47: The IWARP_MPA dissector could crash.\n(CVE-2017-17084)\n\nwnpa-sec-2017-48: The NetBIOS dissector could crash. Discovered by\nKamil Frankowicz. (CVE-2017-17083)\n\nwnpa-sec-2017-49: The CIP Safety dissector could crash.\n(CVE-2017-17085)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.wireshark.org/security/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.wireshark.org/security/wnpa-sec-2017-47.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.wireshark.org/security/wnpa-sec-2017-48.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.wireshark.org/security/wnpa-sec-2017-49.html\"\n );\n # https://vuxml.freebsd.org/freebsd/4b228e69-22e1-4019-afd0-8aa716d0ec0b.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?8f0753c6\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:tshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:tshark-lite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:wireshark-lite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:wireshark-qt5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/11/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/12/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/12/11\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"wireshark>=2.2.0<=2.2.10\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"wireshark>=2.4.0<=2.4.2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"wireshark-lite>=2.2.0<=2.2.10\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"wireshark-lite>=2.4.0<=2.4.2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"wireshark-qt5>=2.2.0<=2.2.10\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"wireshark-qt5>=2.4.0<=2.4.2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"tshark>=2.2.0<=2.2.10\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"tshark>=2.4.0<=2.4.2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"tshark-lite>=2.2.0<=2.2.10\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"tshark-lite>=2.4.0<=2.4.2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-07T14:27:35", "description": "This update for wireshark fixes the following issues :\n\n - CVE-2017-17083: NetBIOS dissector could crash. This was\n addressed in epan/dissectors/packet-netbios.c by\n ensuring that write operations are bounded by the\n beginning of a buffer. (bsc#1070727)\n\n - CVE-2017-17084: IWARP_MPA dissector could crash. This\n was addressed in epan/dissectors/packet-iwarp-mpa.c by\n validating a ULPDU length. (bsc#1070727)\n\n - CVE-2017-17085: the CIP Safety dissector could crash.\n This was addressed in epan/dissectors/packet-cipsafety.c\n by validating the packet length. (bsc#1070727)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 28, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2017-12-28T00:00:00", "title": "SUSE SLED12 / SLES12 Security Update : wireshark (SUSE-SU-2017:3436-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-17084", "CVE-2017-17085", "CVE-2017-17083"], "modified": "2017-12-28T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libwsutil7", "p-cpe:/a:novell:suse_linux:libwiretap6", "p-cpe:/a:novell:suse_linux:libwscodecs1-debuginfo", "cpe:/o:novell:suse_linux:12", "p-cpe:/a:novell:suse_linux:wireshark-debuginfo", "p-cpe:/a:novell:suse_linux:wireshark-gtk-debuginfo", "p-cpe:/a:novell:suse_linux:libwireshark8-debuginfo", "p-cpe:/a:novell:suse_linux:libwscodecs1", "p-cpe:/a:novell:suse_linux:wireshark-debugsource", "p-cpe:/a:novell:suse_linux:libwsutil7-debuginfo", "p-cpe:/a:novell:suse_linux:libwiretap6-debuginfo", "p-cpe:/a:novell:suse_linux:wireshark-gtk", "p-cpe:/a:novell:suse_linux:wireshark", "p-cpe:/a:novell:suse_linux:libwireshark8"], "id": "SUSE_SU-2017-3436-1.NASL", "href": "https://www.tenable.com/plugins/nessus/105481", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2017:3436-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(105481);\n script_version(\"3.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2017-17083\", \"CVE-2017-17084\", \"CVE-2017-17085\");\n\n script_name(english:\"SUSE SLED12 / SLES12 Security Update : wireshark (SUSE-SU-2017:3436-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for wireshark fixes the following issues :\n\n - CVE-2017-17083: NetBIOS dissector could crash. This was\n addressed in epan/dissectors/packet-netbios.c by\n ensuring that write operations are bounded by the\n beginning of a buffer. (bsc#1070727)\n\n - CVE-2017-17084: IWARP_MPA dissector could crash. This\n was addressed in epan/dissectors/packet-iwarp-mpa.c by\n validating a ULPDU length. (bsc#1070727)\n\n - CVE-2017-17085: the CIP Safety dissector could crash.\n This was addressed in epan/dissectors/packet-cipsafety.c\n by validating the packet length. (bsc#1070727)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1070727\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-17083/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-17084/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-17085/\"\n );\n # https://www.suse.com/support/update/announcement/2017/suse-su-20173436-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6366b1e5\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 12-SP3:zypper in -t\npatch SUSE-SLE-SDK-12-SP3-2017-2153=1\n\nSUSE Linux Enterprise Software Development Kit 12-SP2:zypper in -t\npatch SUSE-SLE-SDK-12-SP2-2017-2153=1\n\nSUSE Linux Enterprise Server for Raspberry Pi 12-SP2:zypper in -t\npatch SUSE-SLE-RPI-12-SP2-2017-2153=1\n\nSUSE Linux Enterprise Server 12-SP3:zypper in -t patch\nSUSE-SLE-SERVER-12-SP3-2017-2153=1\n\nSUSE Linux Enterprise Server 12-SP2:zypper in -t patch\nSUSE-SLE-SERVER-12-SP2-2017-2153=1\n\nSUSE Linux Enterprise Desktop 12-SP3:zypper in -t patch\nSUSE-SLE-DESKTOP-12-SP3-2017-2153=1\n\nSUSE Linux Enterprise Desktop 12-SP2:zypper in -t patch\nSUSE-SLE-DESKTOP-12-SP2-2017-2153=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwireshark8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwireshark8-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwiretap6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwiretap6-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwscodecs1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwscodecs1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwsutil7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwsutil7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark-gtk-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/12/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/12/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/12/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED12|SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED12 / SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(2|3)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP2/3\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED12\" && (! preg(pattern:\"^(2|3)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED12 SP2/3\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libwireshark8-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libwireshark8-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libwiretap6-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libwiretap6-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libwscodecs1-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libwscodecs1-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libwsutil7-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libwsutil7-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"wireshark-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"wireshark-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"wireshark-debugsource-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"wireshark-gtk-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"wireshark-gtk-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libwireshark8-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libwireshark8-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libwiretap6-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libwiretap6-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libwscodecs1-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libwscodecs1-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libwsutil7-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libwsutil7-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"wireshark-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"wireshark-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"wireshark-debugsource-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"wireshark-gtk-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"wireshark-gtk-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"libwireshark8-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"libwireshark8-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"libwiretap6-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"libwiretap6-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"libwscodecs1-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"libwscodecs1-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"libwsutil7-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"libwsutil7-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"wireshark-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"wireshark-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"wireshark-debugsource-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"wireshark-gtk-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"wireshark-gtk-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwireshark8-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwireshark8-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwiretap6-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwiretap6-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwscodecs1-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwscodecs1-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwsutil7-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwsutil7-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"wireshark-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"wireshark-debuginfo-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"wireshark-debugsource-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"wireshark-gtk-2.2.11-48.15.3\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"wireshark-gtk-debuginfo-2.2.11-48.15.3\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-12T10:15:54", "description": "New upstream version 2.4.3. It contains fixes for CVE-2017-17084,\nCVE-2017-17083 and CVE-2017-17085.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 19, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2018-01-15T00:00:00", "title": "Fedora 27 : 1:wireshark (2017-3997279e65)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-17084", "CVE-2017-17085", "CVE-2017-17083"], "modified": "2018-01-15T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:27", "p-cpe:/a:fedoraproject:fedora:1:wireshark"], "id": "FEDORA_2017-3997279E65.NASL", "href": "https://www.tenable.com/plugins/nessus/105858", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-3997279e65.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(105858);\n script_version(\"3.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2017-17083\", \"CVE-2017-17084\", \"CVE-2017-17085\");\n script_xref(name:\"FEDORA\", value:\"2017-3997279e65\");\n\n script_name(english:\"Fedora 27 : 1:wireshark (2017-3997279e65)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"New upstream version 2.4.3. It contains fixes for CVE-2017-17084,\nCVE-2017-17083 and CVE-2017-17085.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-3997279e65\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected 1:wireshark package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:1:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:27\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/12/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^27([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 27\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC27\", reference:\"wireshark-2.4.3-1.fc27\", epoch:\"1\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"1:wireshark\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-06-05T11:13:33", "description": "This update for wireshark to version 2.2.11 fixes the following \nissues :\n\nMinor vulnerabilities that could be used to trigger dissector crashes\nby making Wireshark read specially crafted packages from the network\nor capture files (boo#1070727) :\n\n - CVE-2017-17084: IWARP_MPA dissector crash\n (wnpa-sec-2017-47)\n\n - CVE-2017-17083: NetBIOS dissector crash\n (wnpa-sec-2017-48)\n\n - CVE-2017-17085: CIP Safety dissector crash\n (wnpa-sec-2017-49)\n\nThis update also fixes further bugs and updates protocol support as\nlisted in:\nhttps://www.wireshark.org/docs/relnotes/wireshark-2.2.11.html", "edition": 21, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2017-12-14T00:00:00", "title": "openSUSE Security Update : wireshark (openSUSE-2017-1337)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-17084", "CVE-2017-17085", "CVE-2017-17083"], "modified": "2017-12-14T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:wireshark-ui-qt-debuginfo", "p-cpe:/a:novell:opensuse:wireshark", "p-cpe:/a:novell:opensuse:wireshark-devel", "p-cpe:/a:novell:opensuse:wireshark-ui-qt", "p-cpe:/a:novell:opensuse:wireshark-debugsource", "p-cpe:/a:novell:opensuse:wireshark-ui-gtk", "cpe:/o:novell:opensuse:42.3", "p-cpe:/a:novell:opensuse:wireshark-ui-gtk-debuginfo", "cpe:/o:novell:opensuse:42.2", "p-cpe:/a:novell:opensuse:wireshark-debuginfo"], "id": "OPENSUSE-2017-1337.NASL", "href": "https://www.tenable.com/plugins/nessus/105228", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2017-1337.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(105228);\n script_version(\"3.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/06/04\");\n\n script_cve_id(\"CVE-2017-17083\", \"CVE-2017-17084\", \"CVE-2017-17085\");\n\n script_name(english:\"openSUSE Security Update : wireshark (openSUSE-2017-1337)\");\n script_summary(english:\"Check for the openSUSE-2017-1337 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for wireshark to version 2.2.11 fixes the following \nissues :\n\nMinor vulnerabilities that could be used to trigger dissector crashes\nby making Wireshark read specially crafted packages from the network\nor capture files (boo#1070727) :\n\n - CVE-2017-17084: IWARP_MPA dissector crash\n (wnpa-sec-2017-47)\n\n - CVE-2017-17083: NetBIOS dissector crash\n (wnpa-sec-2017-48)\n\n - CVE-2017-17085: CIP Safety dissector crash\n (wnpa-sec-2017-49)\n\nThis update also fixes further bugs and updates protocol support as\nlisted in:\nhttps://www.wireshark.org/docs/relnotes/wireshark-2.2.11.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1070727\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.wireshark.org/docs/relnotes/wireshark-2.2.11.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected wireshark packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-gtk-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-qt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/12/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/12/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.2|SUSE42\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.2 / 42.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.2\", reference:\"wireshark-2.2.11-14.20.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"wireshark-debuginfo-2.2.11-14.20.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"wireshark-debugsource-2.2.11-14.20.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"wireshark-devel-2.2.11-14.20.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"wireshark-ui-gtk-2.2.11-14.20.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"wireshark-ui-gtk-debuginfo-2.2.11-14.20.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"wireshark-ui-qt-2.2.11-14.20.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"wireshark-ui-qt-debuginfo-2.2.11-14.20.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"wireshark-2.2.11-28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"wireshark-debuginfo-2.2.11-28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"wireshark-debugsource-2.2.11-28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"wireshark-devel-2.2.11-28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"wireshark-ui-gtk-2.2.11-28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"wireshark-ui-gtk-debuginfo-2.2.11-28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"wireshark-ui-qt-2.2.11-28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"wireshark-ui-qt-debuginfo-2.2.11-28.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark / wireshark-debuginfo / wireshark-debugsource / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-12T09:38:56", "description": "It was discovered that wireshark, a network protocol analyzer,\ncontained several vulnerabilities in the dissectors for CIP Safety,\nIWARP_MPA, NetBIOS, Profinet I/O and AMQP, which result in denial of\ndervice or the execution of arbitrary code.\n\nFor Debian 7 'Wheezy', these problems have been fixed in version\n1.12.1+g01b65bf-4+deb8u6~deb7u8.\n\nWe recommend that you upgrade your wireshark packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.", "edition": 18, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2018-01-02T00:00:00", "title": "Debian DLA-1226-1 : wireshark security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-17084", "CVE-2017-11408", "CVE-2017-17085", "CVE-2017-17083"], "modified": "2018-01-02T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:wireshark-doc", "p-cpe:/a:debian:debian_linux:libwireshark-dev", "p-cpe:/a:debian:debian_linux:wireshark", "p-cpe:/a:debian:debian_linux:libwireshark-data", "p-cpe:/a:debian:debian_linux:libwiretap-dev", "p-cpe:/a:debian:debian_linux:libwsutil-dev", "p-cpe:/a:debian:debian_linux:wireshark-dbg", "cpe:/o:debian:debian_linux:7.0", "p-cpe:/a:debian:debian_linux:libwsutil2", "p-cpe:/a:debian:debian_linux:libwireshark2", "p-cpe:/a:debian:debian_linux:libwiretap2", "p-cpe:/a:debian:debian_linux:wireshark-common", "p-cpe:/a:debian:debian_linux:wireshark-dev", "p-cpe:/a:debian:debian_linux:tshark"], "id": "DEBIAN_DLA-1226.NASL", "href": "https://www.tenable.com/plugins/nessus/105495", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-1226-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(105495);\n script_version(\"3.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2017-11408\", \"CVE-2017-17083\", \"CVE-2017-17084\", \"CVE-2017-17085\");\n\n script_name(english:\"Debian DLA-1226-1 : wireshark security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that wireshark, a network protocol analyzer,\ncontained several vulnerabilities in the dissectors for CIP Safety,\nIWARP_MPA, NetBIOS, Profinet I/O and AMQP, which result in denial of\ndervice or the execution of arbitrary code.\n\nFor Debian 7 'Wheezy', these problems have been fixed in version\n1.12.1+g01b65bf-4+deb8u6~deb7u8.\n\nWe recommend that you upgrade your wireshark packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2017/12/msg00029.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/wireshark\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwireshark-data\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwireshark-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwireshark2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwiretap-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwiretap2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwsutil-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwsutil2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:tshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/12/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark-data\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u8\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u8\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark2\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u8\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwiretap-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u8\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwiretap2\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u8\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwsutil-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u8\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwsutil2\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u8\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"tshark\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u8\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u8\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-common\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u8\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-dbg\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u8\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u8\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-doc\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u8\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-06T09:51:11", "description": "It was discovered that wireshark, a network protocol analyzer,\ncontained several vulnerabilities in the dissectors for CIP Safety,\nIWARP_MPA, NetBIOS, Profinet I/O and AMQP, which result in denial of\ndervice or the execution of arbitrary code.", "edition": 28, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2017-12-11T00:00:00", "title": "Debian DSA-4060-1 : wireshark - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-17084", "CVE-2017-11408", "CVE-2017-17085", "CVE-2017-13766", "CVE-2017-17083"], "modified": "2017-12-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:wireshark", "cpe:/o:debian:debian_linux:8.0", "cpe:/o:debian:debian_linux:9.0"], "id": "DEBIAN_DSA-4060.NASL", "href": "https://www.tenable.com/plugins/nessus/105121", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-4060. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(105121);\n script_version(\"3.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2017-11408\", \"CVE-2017-13766\", \"CVE-2017-17083\", \"CVE-2017-17084\", \"CVE-2017-17085\");\n script_xref(name:\"DSA\", value:\"4060\");\n\n script_name(english:\"Debian DSA-4060-1 : wireshark - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that wireshark, a network protocol analyzer,\ncontained several vulnerabilities in the dissectors for CIP Safety,\nIWARP_MPA, NetBIOS, Profinet I/O and AMQP, which result in denial of\ndervice or the execution of arbitrary code.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/source-package/wireshark\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/wireshark\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/stretch/wireshark\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2017/dsa-4060\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the wireshark packages.\n\nFor the oldstable distribution (jessie), these problems have been\nfixed in version 1.12.1+g01b65bf-4+deb8u12.\n\nFor the stable distribution (stretch), these problems have been fixed\nin version 2.2.6+g32dac6a-2+deb9u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/12/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/12/11\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark-data\", reference:\"1.12.1+g01b65bf-4+deb8u12\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u12\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark5\", reference:\"1.12.1+g01b65bf-4+deb8u12\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwiretap-dev\", reference:\"1.12.1+g01b65bf-4+deb8u12\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwiretap4\", reference:\"1.12.1+g01b65bf-4+deb8u12\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwsutil-dev\", reference:\"1.12.1+g01b65bf-4+deb8u12\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwsutil4\", reference:\"1.12.1+g01b65bf-4+deb8u12\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"tshark\", reference:\"1.12.1+g01b65bf-4+deb8u12\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark\", reference:\"1.12.1+g01b65bf-4+deb8u12\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-common\", reference:\"1.12.1+g01b65bf-4+deb8u12\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-dbg\", reference:\"1.12.1+g01b65bf-4+deb8u12\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u12\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-doc\", reference:\"1.12.1+g01b65bf-4+deb8u12\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-qt\", reference:\"1.12.1+g01b65bf-4+deb8u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libwireshark-data\", reference:\"2.2.6+g32dac6a-2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libwireshark-dev\", reference:\"2.2.6+g32dac6a-2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libwireshark8\", reference:\"2.2.6+g32dac6a-2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libwiretap-dev\", reference:\"2.2.6+g32dac6a-2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libwiretap6\", reference:\"2.2.6+g32dac6a-2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libwscodecs1\", reference:\"2.2.6+g32dac6a-2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libwsutil-dev\", reference:\"2.2.6+g32dac6a-2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libwsutil7\", reference:\"2.2.6+g32dac6a-2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"tshark\", reference:\"2.2.6+g32dac6a-2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"wireshark\", reference:\"2.2.6+g32dac6a-2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"wireshark-common\", reference:\"2.2.6+g32dac6a-2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"wireshark-dev\", reference:\"2.2.6+g32dac6a-2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"wireshark-doc\", reference:\"2.2.6+g32dac6a-2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"wireshark-gtk\", reference:\"2.2.6+g32dac6a-2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"wireshark-qt\", reference:\"2.2.6+g32dac6a-2+deb9u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-09-23T18:19:53", "description": "This update for wireshark to version 2.2.11 fixes several issues.\nThese security issues were fixed :\n\n - CVE-2017-13767: The MSDP dissector could have gone into\n an infinite loop. This was addressed by adding length\n validation (bsc#1056248)\n\n - CVE-2017-13766: The Profinet I/O dissector could have\n crash with an out-of-bounds write. This was addressed by\n adding string validation (bsc#1056249)\n\n - CVE-2017-13765: The IrCOMM dissector had a buffer\n over-read and application crash. This was addressed by\n adding length validation (bsc#1056251)\n\n - CVE-2017-9766: PROFINET IO data with a high recursion\n depth allowed remote attackers to cause a denial of\n service (stack exhaustion) in the dissect_IODWriteReq\n function (bsc#1045341)\n\n - CVE-2017-9617: Deeply nested DAAP data may have cause\n stack exhaustion (uncontrolled recursion) in the\n dissect_daap_one_tag function in the DAAP dissector\n (bsc#1044417)\n\n - CVE-2017-15192: The BT ATT dissector could crash. This\n was addressed in epan/dissectors/packet-btatt.c by\n considering a case where not all of the BTATT packets\n have the same encapsulation level. (bsc#1062645)\n\n - CVE-2017-15193: The MBIM dissector could crash or\n exhaust system memory. This was addressed in\n epan/dissectors/packet-mbim.c by changing the\n memory-allocation approach. (bsc#1062645)\n\n - CVE-2017-15191: The DMP dissector could crash. This was\n addressed in epan/dissectors/packet-dmp.c by validating\n a string length. (bsc#1062645)\n\n - CVE-2017-17083: NetBIOS dissector could crash. This was\n addressed in epan/dissectors/packet-netbios.c by\n ensuring that write operations are bounded by the\n beginning of a buffer. (bsc#1070727)\n\n - CVE-2017-17084: IWARP_MPA dissector could crash. This\n was addressed in epan/dissectors/packet-iwarp-mpa.c by\n validating a ULPDU length. (bsc#1070727)\n\n - CVE-2017-17085: the CIP Safety dissector could crash.\n This was addressed in epan/dissectors/packet-cipsafety.c\n by validating the packet length. (bsc#1070727)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 23, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2018-01-10T00:00:00", "title": "SUSE SLES11 Security Update : wireshark (SUSE-SU-2018:0054-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-17084", "CVE-2017-9617", "CVE-2017-17085", "CVE-2017-15191", "CVE-2017-13765", "CVE-2017-9766", "CVE-2017-15192", "CVE-2017-13766", "CVE-2017-15193", "CVE-2017-13767", "CVE-2017-17083"], "modified": "2018-01-10T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libwsutil7", "p-cpe:/a:novell:suse_linux:libwiretap6", "p-cpe:/a:novell:suse_linux:libsmi", "p-cpe:/a:novell:suse_linux:portaudio", "cpe:/o:novell:suse_linux:11", "p-cpe:/a:novell:suse_linux:libwscodecs1", "p-cpe:/a:novell:suse_linux:wireshark-gtk", "p-cpe:/a:novell:suse_linux:wireshark", "p-cpe:/a:novell:suse_linux:libwireshark8"], "id": "SUSE_SU-2018-0054-1.NASL", "href": "https://www.tenable.com/plugins/nessus/105720", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2018:0054-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(105720);\n script_version(\"3.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/22\");\n\n script_cve_id(\"CVE-2017-13765\", \"CVE-2017-13766\", \"CVE-2017-13767\", \"CVE-2017-15191\", \"CVE-2017-15192\", \"CVE-2017-15193\", \"CVE-2017-17083\", \"CVE-2017-17084\", \"CVE-2017-17085\", \"CVE-2017-9617\", \"CVE-2017-9766\");\n\n script_name(english:\"SUSE SLES11 Security Update : wireshark (SUSE-SU-2018:0054-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for wireshark to version 2.2.11 fixes several issues.\nThese security issues were fixed :\n\n - CVE-2017-13767: The MSDP dissector could have gone into\n an infinite loop. This was addressed by adding length\n validation (bsc#1056248)\n\n - CVE-2017-13766: The Profinet I/O dissector could have\n crash with an out-of-bounds write. This was addressed by\n adding string validation (bsc#1056249)\n\n - CVE-2017-13765: The IrCOMM dissector had a buffer\n over-read and application crash. This was addressed by\n adding length validation (bsc#1056251)\n\n - CVE-2017-9766: PROFINET IO data with a high recursion\n depth allowed remote attackers to cause a denial of\n service (stack exhaustion) in the dissect_IODWriteReq\n function (bsc#1045341)\n\n - CVE-2017-9617: Deeply nested DAAP data may have cause\n stack exhaustion (uncontrolled recursion) in the\n dissect_daap_one_tag function in the DAAP dissector\n (bsc#1044417)\n\n - CVE-2017-15192: The BT ATT dissector could crash. This\n was addressed in epan/dissectors/packet-btatt.c by\n considering a case where not all of the BTATT packets\n have the same encapsulation level. (bsc#1062645)\n\n - CVE-2017-15193: The MBIM dissector could crash or\n exhaust system memory. This was addressed in\n epan/dissectors/packet-mbim.c by changing the\n memory-allocation approach. (bsc#1062645)\n\n - CVE-2017-15191: The DMP dissector could crash. This was\n addressed in epan/dissectors/packet-dmp.c by validating\n a string length. (bsc#1062645)\n\n - CVE-2017-17083: NetBIOS dissector could crash. This was\n addressed in epan/dissectors/packet-netbios.c by\n ensuring that write operations are bounded by the\n beginning of a buffer. (bsc#1070727)\n\n - CVE-2017-17084: IWARP_MPA dissector could crash. This\n was addressed in epan/dissectors/packet-iwarp-mpa.c by\n validating a ULPDU length. (bsc#1070727)\n\n - CVE-2017-17085: the CIP Safety dissector could crash.\n This was addressed in epan/dissectors/packet-cipsafety.c\n by validating the packet length. (bsc#1070727)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1044417\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1045341\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1056248\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1056249\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1056251\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1062645\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1070727\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-13765/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-13766/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-13767/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-15191/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-15192/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-15193/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-17083/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-17084/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-17085/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9617/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9766/\"\n );\n # https://www.suse.com/support/update/announcement/2018/suse-su-20180054-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?895a93c8\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 11-SP4:zypper in -t\npatch sdksp4-wireshark-13400=1\n\nSUSE Linux Enterprise Server 11-SP4:zypper in -t patch\nslessp4-wireshark-13400=1\n\nSUSE Linux Enterprise Debuginfo 11-SP4:zypper in -t patch\ndbgsp4-wireshark-13400=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libsmi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwireshark8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwiretap6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwscodecs1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwsutil7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:portaudio\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/06/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/10\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES11)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES11\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES11\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES11 SP4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"libsmi-0.4.5-2.7.2.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"libwireshark8-2.2.11-40.14.5\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"libwiretap6-2.2.11-40.14.5\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"libwscodecs1-2.2.11-40.14.5\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"libwsutil7-2.2.11-40.14.5\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"portaudio-19-234.18.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"wireshark-2.2.11-40.14.5\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"wireshark-gtk-2.2.11-40.14.5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-07T09:00:55", "description": "According to the versions of the wireshark packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - Wireshark is a network traffic analyzer for Unix-ish\n operating systems.This package lays base for libpcap, a\n packet capture and filtering library, contains\n command-line utilities, contains plugins and\n documentation for wireshark. A graphical user interface\n is packaged separately to GTK+ package.Security\n Fix(es):In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7,\n and 2.2.0 to 2.2.15, dissectors that support zlib\n decompression could crash. This was addressed in\n epan/tvbuff_zlib.c by rejecting negative lengths to\n avoid a buffer over-read.(CVE-2018-14340)In Wireshark\n 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15,\n the DICOM dissector could go into a large or infinite\n loop. This was addressed in\n epan/dissectors/packet-dcm.c by preventing an offset\n overflow.(CVE-2018-14341)In Wireshark 2.4.0 to 2.4.3\n and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB\n dissectors could crash. This was addressed in\n epan/tvbparse.c by limiting the recursion\n depth.(CVE-2018-5336)In Wireshark 2.2.0 to 2.2.12 and\n 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This\n was addressed in epan/dissectors/packet-sigcomp.c by\n correcting the extraction of the length\n value.(CVE-2018-7418)In Wireshark 2.2.0 to 2.2.6, the\n ROS dissector could crash with a NULL pointer\n dereference. This was addressed in\n epan/dissectors/asn1/ros/packet-ros-template.c by\n validating an OID.(CVE-2017-9347)In Wireshark 2.2.0 to\n 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an\n infinite loop. This was addressed in\n epan/dissectors/packet-dcm.c by validating a length\n value.(CVE-2017-9349)In Wireshark 2.6.0 to 2.6.4 and\n 2.4.0 to 2.4.10, the MMSE dissector could go into an\n infinite loop. This was addressed in\n epan/dissectors/packet-mmse.c by preventing length\n overflows.(CVE-2018-19622)The dissect_dcom_OBJREF\n function in epan/dissectors/packet-dcom.c in the DCOM\n dissector in Wireshark 1.12.x before 1.12.9 does not\n initialize a certain IPv4 data structure, which allows\n remote attackers to cause a denial of service\n (application crash) via a crafted\n packet.(CVE-2015-8714)In Wireshark 2.4.0, 2.2.0 to\n 2.2.8, and 2.0.0 to 2.0.14, the IrCOMM dissector has a\n buffer over-read and application crash. This was\n addressed in plugins/irda/packet-ircomm.c by adding\n length validation.(CVE-2017-13765)In Wireshark 2.4.0 to\n 2.4.2 and 2.2.0 to 2.2.10, the NetBIOS dissector could\n crash. This was addressed in\n epan/dissectors/packet-netbios.c by ensuring that write\n operations are bounded by the beginning of a\n buffer.(CVE-2017-17083)The dissect_hsdsch_channel_info\n function in epan/dissectors/packet-umts_fp.c in the\n UMTS FP dissector in Wireshark 1.12.x before 1.12.9\n does not validate the number of PDUs, which allows\n remote attackers to cause a denial of service\n (application crash) via a crafted\n packet.(CVE-2015-8712)epan/dissectors/packet-umts_fp.c\n in the UMTS FP dissector in Wireshark 1.12.x before\n 1.12.9 does not properly reserve memory for channel ID\n mappings, which allows remote attackers to cause a\n denial of service (out-of-bounds memory access and\n application crash) via a crafted\n packet.(CVE-2015-8713)In Wireshark 2.2.0 to 2.2.5 and\n 2.0.0 to 2.0.11, the IMAP dissector could crash,\n triggered by packet injection or a malformed capture\n file. This was addressed in\n epan/dissectors/packet-imap.c by calculating a line's\n end correctly.(CVE-2017-7703)In Wireshark 2.2.0 to\n 2.2.6 and 2.0.0 to 2.0.12, the DNS dissector could go\n into an infinite loop. This was addressed in\n epan/dissectors/packet-dns.c by trying to detect\n self-referencing pointers.(CVE-2017-9345)In Wireshark\n 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bazaar\n dissector could go into an infinite loop. This was\n addressed in epan/dissectors/packet-bzr.c by ensuring\n that backwards parsing cannot occur.(CVE-2017-9352)In\n Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to\n 2.2.16, the Radiotap dissector could crash. This was\n addressed in\n epan/dissectors/packet-ieee80211-radiotap-iter.c by\n validating iterator\n operations.(CVE-2018-16057)epan/dissectors/packet-catap\n ult-dct2000.c in the Catapult DCT2000 dissector in\n Wireshark 2.x before 2.0.6 does not restrict the number\n of channels, which allows remote attackers to cause a\n denial of service (buffer over-read and application\n crash) via a crafted packet.(CVE-2016-7177)Stack-based\n buffer overflow in\n epan/dissectors/packet-catapult-dct2000.c in the\n Catapult DCT2000 dissector in Wireshark 2.x before\n 2.0.6 allows remote attackers to cause a denial of\n service (application crash) via a crafted\n packet.(CVE-2016-7179)In Wireshark 2.2.0, the NCP\n dissector could crash, triggered by packet injection or\n a malformed capture file. This was addressed in\n epan/dissectors/CMakeLists.txt by registering this\n dissector.(CVE-2016-7958)In Wireshark 2.2.0 to 2.2.1\n and 2.0.0 to 2.0.7, the DTN dissector could go into an\n infinite loop, triggered by network traffic or a\n capture file. This was addressed in\n epan/dissectors/packet-dtn.c by checking whether SDNV\n evaluation was\n successful.(CVE-2016-9375)epan/dissectors/packet-wbxml.\n c in the WBXML dissector in Wireshark 1.12.x before\n 1.12.12 mishandles offsets, which allows remote\n attackers to cause a denial of service (integer\n overflow and infinite loop) via a crafted\n packet.(CVE-2016-5359)epan/dissectors/packet-packetbb.c\n in the PacketBB dissector in Wireshark 1.12.x before\n 1.12.13 and 2.x before 2.0.5 allows remote attackers to\n cause a denial of service (divide-by-zero error and\n application crash) via a crafted\n packet.(CVE-2016-6505)epan/dissectors/packet-mmse.c in\n the MMSE dissector in Wireshark 1.12.x before 1.12.13\n allows remote attackers to cause a denial of service\n (infinite loop) via a crafted\n packet.(CVE-2016-6507)epan/dissectors/packet-rlc.c in\n the RLC dissector in Wireshark 1.12.x before 1.12.13\n and 2.x before 2.0.5 uses an incorrect integer data\n type, which allows remote attackers to cause a denial\n of service (large loop) via a crafted\n packet.(CVE-2016-6508)Off-by-one error in\n epan/dissectors/packet-rlc.c in the RLC dissector in\n Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5\n allows remote attackers to cause a denial of service\n (stack-based buffer overflow and application crash) via\n a crafted\n packet.(CVE-2016-6510)epan/dissectors/packet-iax2.c in\n the IAX2 dissector in Wireshark 1.12.x before 1.12.11\n and 2.0.x before 2.0.3 uses an incorrect integer data\n type, which allows remote attackers to cause a denial\n of service (infinite loop) via a crafted\n packet.(CVE-2016-4081)Stack-based buffer overflow in\n epan/dissectors/packet-ncp2222.inc in the NCP dissector\n in Wireshark 1.12.x before 1.12.11 allows remote\n attackers to cause a denial of service (application\n crash) or possibly have unspecified other impact via a\n long string in a\n packet.(CVE-2016-4085)epan/dissectors/packet-dcerpc-spo\n olss.c in the SPOOLS component in Wireshark 1.12.x\n before 1.12.12 and 2.x before 2.0.4 mishandles\n unexpected offsets, which allows remote attackers to\n cause a denial of service (infinite loop) via a crafted\n packet.(CVE-2016-5350)epan/dissectors/packet-umts_fp.c\n in the UMTS FP dissector in Wireshark 1.12.x before\n 1.12.12 and 2.x before 2.0.4 mishandles the reserved\n C/T value, which allows remote attackers to cause a\n denial of service (application crash) via a crafted\n packet.(CVE-2016-5353)Off-by-one error in\n epan/dissectors/packet-rsl.c in the RSL dissector in\n Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2\n allows remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted packet that triggers a 0xff tag value, a\n different vulnerability than\n CVE-2016-2530.(CVE-2016-2531)The\n dissect_llrp_parameters function in\n epan/dissectors/packet-llrp.c in the LLRP dissector in\n Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2\n does not limit the recursion depth, which allows remote\n attackers to cause a denial of service (memory\n consumption or application crash) via a crafted\n packet.(CVE-2016-2532)epan/proto.c in Wireshark 1.12.x\n before 1.12.11 and 2.0.x before 2.0.3 does not limit\n the protocol-tree depth, which allows remote attackers\n to cause a denial of service (stack memory consumption\n and application crash) via a crafted\n packet.(CVE-2016-4006)epan/reassemble.c in TShark in\n Wireshark 2.0.x before 2.0.3 relies on incorrect\n special-case handling of truncated Tvb data structures,\n which allows remote attackers to cause a denial of\n service (use-after-free and application crash) via a\n crafted packet.(CVE-2016-4077)The AirPDcapPacketProcess\n function in epan/crypt/airpdcap.c in the 802.11\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not validate the relationship between\n the total length and the capture length, which allows\n remote attackers to cause a denial of service\n (stack-based buffer overflow and application crash) via\n a crafted packet.(CVE-2015-8723)The ascend_seek\n function in wiretap/ascendtext.c in the Ascend file\n parser in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not ensure the presence of a '\\0'\n character at the end of a date string, which allows\n remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted file.(CVE-2015-8729)The dissct_rsl_ipaccess_msg\n function in epan/dissectors/packet-rsl.c in the RSL\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not reject unknown TLV types, which\n allows remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted packet.(CVE-2015-8731)The\n dissct_rsl_ipaccess_msg function in\n epan/dissectors/packet-rsl.c in the RSL dissector in\n Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2\n mishandles the case of an unrecognized TLV type, which\n allows remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted packet, a different vulnerability than\n CVE-2016-2531.(CVE-2016-2530)The dnp3_al_process_object\n function in epan/dissectors/packet-dnp.c in the DNP3\n dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x\n before 2.0.2 allows remote attackers to cause a denial\n of service (infinite loop) via a crafted\n packet.(CVE-2016-2523)The init_t38_info_conv function\n in epan/dissectors/packet-t38.c in the T.38 dissector\n in Wireshark 1.12.x before 1.12.9 does not ensure that\n a conversation exists, which allows remote attackers to\n cause a denial of service (application crash) via a\n crafted packet.(CVE-2015-8716)The dissect_sdp function\n in epan/dissectors/packet-sdp.c in the SDP dissector in\n Wireshark 1.12.x before 1.12.9 does not prevent use of\n a negative media count, which allows remote attackers\n to cause a denial of service (application crash) via a\n crafted packet.(CVE-2015-8717)Double free vulnerability\n in epan/dissectors/packet-nlm.c in the NLM dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1,\n when the 'Match MSG/RES packets for async NLM' option\n is enabled, allows remote attackers to cause a denial\n of service (application crash) via a crafted\n packet.(CVE-2015-8718)The dissect_dns_answer function\n in epan/dissectors/packet-dns.c in the DNS dissector in\n Wireshark 1.12.x before 1.12.9 mishandles the EDNS0\n Client Subnet option, which allows remote attackers to\n cause a denial of service (application crash) via a\n crafted packet.(CVE-2015-8719)Buffer overflow in the\n tvb_uncompress function in epan/tvbuff_zlib.c in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n allows remote attackers to cause a denial of service\n (application crash) via a crafted packet with zlib\n compression.(CVE-2015-8721)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 11, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2019-12-04T00:00:00", "title": "EulerOS 2.0 SP2 : wireshark (EulerOS-SA-2019-2425)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-9347", "CVE-2015-8713", "CVE-2015-8717", "CVE-2016-5350", "CVE-2015-8714", "CVE-2016-2531", "CVE-2016-6505", "CVE-2016-2530", "CVE-2016-6510", "CVE-2016-4081", "CVE-2016-7177", "CVE-2015-8719", "CVE-2017-9349", "CVE-2016-7179", "CVE-2016-4077", "CVE-2015-8731", "CVE-2018-19622", "CVE-2018-14341", "CVE-2015-8723", "CVE-2018-7418", "CVE-2016-4085", "CVE-2018-5336", "CVE-2016-6508", "CVE-2016-5353", "CVE-2016-5359", "CVE-2018-16057", "CVE-2017-13765", "CVE-2015-8729", "CVE-2015-8721", "CVE-2016-9375", "CVE-2016-6507", "CVE-2017-9345", "CVE-2016-2532", "CVE-2017-7703", "CVE-2016-7958", "CVE-2015-8712", "CVE-2016-4006", "CVE-2016-2523", "CVE-2018-14340", "CVE-2015-8716", "CVE-2017-9352", "CVE-2015-8718", "CVE-2017-17083"], "modified": "2019-12-04T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:wireshark", "p-cpe:/a:huawei:euleros:wireshark-gnome", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2019-2425.NASL", "href": "https://www.tenable.com/plugins/nessus/131579", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(131579);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2015-8712\",\n \"CVE-2015-8713\",\n \"CVE-2015-8714\",\n \"CVE-2015-8716\",\n \"CVE-2015-8717\",\n \"CVE-2015-8718\",\n \"CVE-2015-8719\",\n \"CVE-2015-8721\",\n \"CVE-2015-8723\",\n \"CVE-2015-8729\",\n \"CVE-2015-8731\",\n \"CVE-2016-2523\",\n \"CVE-2016-2530\",\n \"CVE-2016-2531\",\n \"CVE-2016-2532\",\n \"CVE-2016-4006\",\n \"CVE-2016-4077\",\n \"CVE-2016-4081\",\n \"CVE-2016-4085\",\n \"CVE-2016-5350\",\n \"CVE-2016-5353\",\n \"CVE-2016-5359\",\n \"CVE-2016-6505\",\n \"CVE-2016-6507\",\n \"CVE-2016-6508\",\n \"CVE-2016-6510\",\n \"CVE-2016-7177\",\n \"CVE-2016-7179\",\n \"CVE-2016-7958\",\n \"CVE-2016-9375\",\n \"CVE-2017-13765\",\n \"CVE-2017-17083\",\n \"CVE-2017-7703\",\n \"CVE-2017-9345\",\n \"CVE-2017-9347\",\n \"CVE-2017-9349\",\n \"CVE-2017-9352\",\n \"CVE-2018-14340\",\n \"CVE-2018-14341\",\n \"CVE-2018-16057\",\n \"CVE-2018-19622\",\n \"CVE-2018-5336\",\n \"CVE-2018-7418\"\n );\n\n script_name(english:\"EulerOS 2.0 SP2 : wireshark (EulerOS-SA-2019-2425)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the wireshark packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - Wireshark is a network traffic analyzer for Unix-ish\n operating systems.This package lays base for libpcap, a\n packet capture and filtering library, contains\n command-line utilities, contains plugins and\n documentation for wireshark. A graphical user interface\n is packaged separately to GTK+ package.Security\n Fix(es):In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7,\n and 2.2.0 to 2.2.15, dissectors that support zlib\n decompression could crash. This was addressed in\n epan/tvbuff_zlib.c by rejecting negative lengths to\n avoid a buffer over-read.(CVE-2018-14340)In Wireshark\n 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15,\n the DICOM dissector could go into a large or infinite\n loop. This was addressed in\n epan/dissectors/packet-dcm.c by preventing an offset\n overflow.(CVE-2018-14341)In Wireshark 2.4.0 to 2.4.3\n and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB\n dissectors could crash. This was addressed in\n epan/tvbparse.c by limiting the recursion\n depth.(CVE-2018-5336)In Wireshark 2.2.0 to 2.2.12 and\n 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This\n was addressed in epan/dissectors/packet-sigcomp.c by\n correcting the extraction of the length\n value.(CVE-2018-7418)In Wireshark 2.2.0 to 2.2.6, the\n ROS dissector could crash with a NULL pointer\n dereference. This was addressed in\n epan/dissectors/asn1/ros/packet-ros-template.c by\n validating an OID.(CVE-2017-9347)In Wireshark 2.2.0 to\n 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an\n infinite loop. This was addressed in\n epan/dissectors/packet-dcm.c by validating a length\n value.(CVE-2017-9349)In Wireshark 2.6.0 to 2.6.4 and\n 2.4.0 to 2.4.10, the MMSE dissector could go into an\n infinite loop. This was addressed in\n epan/dissectors/packet-mmse.c by preventing length\n overflows.(CVE-2018-19622)The dissect_dcom_OBJREF\n function in epan/dissectors/packet-dcom.c in the DCOM\n dissector in Wireshark 1.12.x before 1.12.9 does not\n initialize a certain IPv4 data structure, which allows\n remote attackers to cause a denial of service\n (application crash) via a crafted\n packet.(CVE-2015-8714)In Wireshark 2.4.0, 2.2.0 to\n 2.2.8, and 2.0.0 to 2.0.14, the IrCOMM dissector has a\n buffer over-read and application crash. This was\n addressed in plugins/irda/packet-ircomm.c by adding\n length validation.(CVE-2017-13765)In Wireshark 2.4.0 to\n 2.4.2 and 2.2.0 to 2.2.10, the NetBIOS dissector could\n crash. This was addressed in\n epan/dissectors/packet-netbios.c by ensuring that write\n operations are bounded by the beginning of a\n buffer.(CVE-2017-17083)The dissect_hsdsch_channel_info\n function in epan/dissectors/packet-umts_fp.c in the\n UMTS FP dissector in Wireshark 1.12.x before 1.12.9\n does not validate the number of PDUs, which allows\n remote attackers to cause a denial of service\n (application crash) via a crafted\n packet.(CVE-2015-8712)epan/dissectors/packet-umts_fp.c\n in the UMTS FP dissector in Wireshark 1.12.x before\n 1.12.9 does not properly reserve memory for channel ID\n mappings, which allows remote attackers to cause a\n denial of service (out-of-bounds memory access and\n application crash) via a crafted\n packet.(CVE-2015-8713)In Wireshark 2.2.0 to 2.2.5 and\n 2.0.0 to 2.0.11, the IMAP dissector could crash,\n triggered by packet injection or a malformed capture\n file. This was addressed in\n epan/dissectors/packet-imap.c by calculating a line's\n end correctly.(CVE-2017-7703)In Wireshark 2.2.0 to\n 2.2.6 and 2.0.0 to 2.0.12, the DNS dissector could go\n into an infinite loop. This was addressed in\n epan/dissectors/packet-dns.c by trying to detect\n self-referencing pointers.(CVE-2017-9345)In Wireshark\n 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bazaar\n dissector could go into an infinite loop. This was\n addressed in epan/dissectors/packet-bzr.c by ensuring\n that backwards parsing cannot occur.(CVE-2017-9352)In\n Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to\n 2.2.16, the Radiotap dissector could crash. This was\n addressed in\n epan/dissectors/packet-ieee80211-radiotap-iter.c by\n validating iterator\n operations.(CVE-2018-16057)epan/dissectors/packet-catap\n ult-dct2000.c in the Catapult DCT2000 dissector in\n Wireshark 2.x before 2.0.6 does not restrict the number\n of channels, which allows remote attackers to cause a\n denial of service (buffer over-read and application\n crash) via a crafted packet.(CVE-2016-7177)Stack-based\n buffer overflow in\n epan/dissectors/packet-catapult-dct2000.c in the\n Catapult DCT2000 dissector in Wireshark 2.x before\n 2.0.6 allows remote attackers to cause a denial of\n service (application crash) via a crafted\n packet.(CVE-2016-7179)In Wireshark 2.2.0, the NCP\n dissector could crash, triggered by packet injection or\n a malformed capture file. This was addressed in\n epan/dissectors/CMakeLists.txt by registering this\n dissector.(CVE-2016-7958)In Wireshark 2.2.0 to 2.2.1\n and 2.0.0 to 2.0.7, the DTN dissector could go into an\n infinite loop, triggered by network traffic or a\n capture file. This was addressed in\n epan/dissectors/packet-dtn.c by checking whether SDNV\n evaluation was\n successful.(CVE-2016-9375)epan/dissectors/packet-wbxml.\n c in the WBXML dissector in Wireshark 1.12.x before\n 1.12.12 mishandles offsets, which allows remote\n attackers to cause a denial of service (integer\n overflow and infinite loop) via a crafted\n packet.(CVE-2016-5359)epan/dissectors/packet-packetbb.c\n in the PacketBB dissector in Wireshark 1.12.x before\n 1.12.13 and 2.x before 2.0.5 allows remote attackers to\n cause a denial of service (divide-by-zero error and\n application crash) via a crafted\n packet.(CVE-2016-6505)epan/dissectors/packet-mmse.c in\n the MMSE dissector in Wireshark 1.12.x before 1.12.13\n allows remote attackers to cause a denial of service\n (infinite loop) via a crafted\n packet.(CVE-2016-6507)epan/dissectors/packet-rlc.c in\n the RLC dissector in Wireshark 1.12.x before 1.12.13\n and 2.x before 2.0.5 uses an incorrect integer data\n type, which allows remote attackers to cause a denial\n of service (large loop) via a crafted\n packet.(CVE-2016-6508)Off-by-one error in\n epan/dissectors/packet-rlc.c in the RLC dissector in\n Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5\n allows remote attackers to cause a denial of service\n (stack-based buffer overflow and application crash) via\n a crafted\n packet.(CVE-2016-6510)epan/dissectors/packet-iax2.c in\n the IAX2 dissector in Wireshark 1.12.x before 1.12.11\n and 2.0.x before 2.0.3 uses an incorrect integer data\n type, which allows remote attackers to cause a denial\n of service (infinite loop) via a crafted\n packet.(CVE-2016-4081)Stack-based buffer overflow in\n epan/dissectors/packet-ncp2222.inc in the NCP dissector\n in Wireshark 1.12.x before 1.12.11 allows remote\n attackers to cause a denial of service (application\n crash) or possibly have unspecified other impact via a\n long string in a\n packet.(CVE-2016-4085)epan/dissectors/packet-dcerpc-spo\n olss.c in the SPOOLS component in Wireshark 1.12.x\n before 1.12.12 and 2.x before 2.0.4 mishandles\n unexpected offsets, which allows remote attackers to\n cause a denial of service (infinite loop) via a crafted\n packet.(CVE-2016-5350)epan/dissectors/packet-umts_fp.c\n in the UMTS FP dissector in Wireshark 1.12.x before\n 1.12.12 and 2.x before 2.0.4 mishandles the reserved\n C/T value, which allows remote attackers to cause a\n denial of service (application crash) via a crafted\n packet.(CVE-2016-5353)Off-by-one error in\n epan/dissectors/packet-rsl.c in the RSL dissector in\n Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2\n allows remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted packet that triggers a 0xff tag value, a\n different vulnerability than\n CVE-2016-2530.(CVE-2016-2531)The\n dissect_llrp_parameters function in\n epan/dissectors/packet-llrp.c in the LLRP dissector in\n Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2\n does not limit the recursion depth, which allows remote\n attackers to cause a denial of service (memory\n consumption or application crash) via a crafted\n packet.(CVE-2016-2532)epan/proto.c in Wireshark 1.12.x\n before 1.12.11 and 2.0.x before 2.0.3 does not limit\n the protocol-tree depth, which allows remote attackers\n to cause a denial of service (stack memory consumption\n and application crash) via a crafted\n packet.(CVE-2016-4006)epan/reassemble.c in TShark in\n Wireshark 2.0.x before 2.0.3 relies on incorrect\n special-case handling of truncated Tvb data structures,\n which allows remote attackers to cause a denial of\n service (use-after-free and application crash) via a\n crafted packet.(CVE-2016-4077)The AirPDcapPacketProcess\n function in epan/crypt/airpdcap.c in the 802.11\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not validate the relationship between\n the total length and the capture length, which allows\n remote attackers to cause a denial of service\n (stack-based buffer overflow and application crash) via\n a crafted packet.(CVE-2015-8723)The ascend_seek\n function in wiretap/ascendtext.c in the Ascend file\n parser in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not ensure the presence of a '\\0'\n character at the end of a date string, which allows\n remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted file.(CVE-2015-8729)The dissct_rsl_ipaccess_msg\n function in epan/dissectors/packet-rsl.c in the RSL\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not reject unknown TLV types, which\n allows remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted packet.(CVE-2015-8731)The\n dissct_rsl_ipaccess_msg function in\n epan/dissectors/packet-rsl.c in the RSL dissector in\n Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2\n mishandles the case of an unrecognized TLV type, which\n allows remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted packet, a different vulnerability than\n CVE-2016-2531.(CVE-2016-2530)The dnp3_al_process_object\n function in epan/dissectors/packet-dnp.c in the DNP3\n dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x\n before 2.0.2 allows remote attackers to cause a denial\n of service (infinite loop) via a crafted\n packet.(CVE-2016-2523)The init_t38_info_conv function\n in epan/dissectors/packet-t38.c in the T.38 dissector\n in Wireshark 1.12.x before 1.12.9 does not ensure that\n a conversation exists, which allows remote attackers to\n cause a denial of service (application crash) via a\n crafted packet.(CVE-2015-8716)The dissect_sdp function\n in epan/dissectors/packet-sdp.c in the SDP dissector in\n Wireshark 1.12.x before 1.12.9 does not prevent use of\n a negative media count, which allows remote attackers\n to cause a denial of service (application crash) via a\n crafted packet.(CVE-2015-8717)Double free vulnerability\n in epan/dissectors/packet-nlm.c in the NLM dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1,\n when the 'Match MSG/RES packets for async NLM' option\n is enabled, allows remote attackers to cause a denial\n of service (application crash) via a crafted\n packet.(CVE-2015-8718)The dissect_dns_answer function\n in epan/dissectors/packet-dns.c in the DNS dissector in\n Wireshark 1.12.x before 1.12.9 mishandles the EDNS0\n Client Subnet option, which allows remote attackers to\n cause a denial of service (application crash) via a\n crafted packet.(CVE-2015-8719)Buffer overflow in the\n tvb_uncompress function in epan/tvbuff_zlib.c in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n allows remote attackers to cause a denial of service\n (application crash) via a crafted packet with zlib\n compression.(CVE-2015-8721)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2425\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?53098281\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected wireshark packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/04\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:wireshark-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(2)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"wireshark-1.10.14-7.h12\",\n \"wireshark-gnome-1.10.14-7.h12\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"2\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "debian": [{"lastseen": "2019-05-30T02:21:36", "bulletinFamily": "unix", "cvelist": ["CVE-2017-17084", "CVE-2017-11408", "CVE-2017-17085", "CVE-2017-17083"], "description": "Package : wireshark\nVersion : 1.12.1+g01b65bf-4+deb8u6~deb7u8\nCVE ID : CVE-2017-11408 CVE-2017-17083 CVE-2017-17084 CVE-2017-17085\n\n\nIt was discovered that wireshark, a network protocol analyzer, contained\nseveral vulnerabilities in the dissectors for CIP Safety, IWARP_MPA,\nNetBIOS, Profinet I/O and AMQP, which result in denial of dervice or the\nexecution of arbitrary code.\n\n\nFor Debian 7 "Wheezy", these problems have been fixed in version\n1.12.1+g01b65bf-4+deb8u6~deb7u8.\n\nWe recommend that you upgrade your wireshark packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 3, "modified": "2017-12-31T14:48:36", "published": "2017-12-31T14:48:36", "id": "DEBIAN:DLA-1226-1:264C9", "href": "https://lists.debian.org/debian-lts-announce/2017/debian-lts-announce-201712/msg00029.html", "title": "[SECURITY] [DLA 1226-1] wireshark security update", "type": "debian", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-11-01T13:14:33", "bulletinFamily": "unix", "cvelist": ["CVE-2017-17084", "CVE-2017-11408", "CVE-2017-17085", "CVE-2017-13766", "CVE-2017-17083"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4060-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nDecember 09, 2017 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : wireshark\nCVE ID : CVE-2017-11408 CVE-2017-13766 CVE-2017-17083 CVE-2017-17084 \n CVE-2017-17085\n\nIt was discovered that wireshark, a network protocol analyzer, contained\nseveral vulnerabilities in the dissectors for CIP Safety, IWARP_MPA,\nNetBIOS, Profinet I/O and AMQP, which result in denial of dervice or the\nexecution of arbitrary code.\n\nFor the oldstable distribution (jessie), these problems have been fixed\nin version 1.12.1+g01b65bf-4+deb8u12.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 2.2.6+g32dac6a-2+deb9u1.\n\nWe recommend that you upgrade your wireshark packages.\n\nFor the detailed security status of wireshark please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/wireshark\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 15, "modified": "2017-12-09T11:51:40", "published": "2017-12-09T11:51:40", "id": "DEBIAN:DSA-4060-1:D5D23", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2017/msg00323.html", "title": "[SECURITY] [DSA 4060-1] wireshark security update", "type": "debian", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "zdt": [{"lastseen": "2018-03-13T14:16:17", "description": "Exploit for multiple platform in category dos / poc", "edition": 1, "published": "2017-12-07T00:00:00", "type": "zdt", "title": "Wireshark 2.4.0 - 2.4.2 / 2.2.0 - 2.2.10 - CIP Safety Dissector Crash Exploit", "bulletinFamily": "exploit", "cvelist": ["CVE-2017-17085"], "modified": "2017-12-07T00:00:00", "href": "https://0day.today/exploit/description/29142", "id": "1337DAY-ID-29142", "sourceData": "Summary\r\n \r\nName: CIP Safety dissector crash\r\n \r\nDocid: wnpa-sec-2017-49\r\n \r\nDate: November 30, 2017\r\n \r\nAffected versions: 2.4.0 to 2.4.2, 2.2.0 to 2.2.10\r\n \r\nFixed versions: 2.4.3, 2.2.11\r\n \r\nReferences: \r\nWireshark bug 14250\r\n \r\nDetails\r\n \r\nDescription\r\nThe CIP Safety dissector could crash.\r\nImpact\r\nIt may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.\r\n \r\nResolution\r\nUpgrade to Wireshark 2.4.3, 2.2.11 or later.\r\n \r\n \r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/43233.zip\n\n# 0day.today [2018-03-13] #", "sourceHref": "https://0day.today/exploit/29142", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "exploitdb": [{"lastseen": "2017-12-07T07:11:00", "description": "Wireshark 2.4.0 - 2.4.2 / 2.2.0 - 2.2.10 - CIP Safety Dissector Crash. CVE-2017-17085. Dos exploit for Multiple platform. Tags: Denial of Service (DoS)", "published": "2017-12-07T00:00:00", "type": "exploitdb", "title": "Wireshark 2.4.0 - 2.4.2 / 2.2.0 - 2.2.10 - CIP Safety Dissector Crash", "bulletinFamily": "exploit", "cvelist": ["CVE-2017-17085"], "modified": "2017-12-07T00:00:00", "id": "EDB-ID:43233", "href": "https://www.exploit-db.com/exploits/43233/", "sourceData": "Summary\r\n\r\nName: CIP Safety dissector crash\r\n\r\nDocid: wnpa-sec-2017-49\r\n\r\nDate: November 30, 2017\r\n\r\nAffected versions: 2.4.0 to 2.4.2, 2.2.0 to 2.2.10\r\n\r\nFixed versions: 2.4.3, 2.2.11\r\n\r\nReferences: \r\nWireshark bug 14250\r\n\r\nDetails\r\n\r\nDescription\r\nThe CIP Safety dissector could crash.\r\nImpact\r\nIt may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.\r\n\r\nResolution\r\nUpgrade to Wireshark 2.4.3, 2.2.11 or later.\r\n\r\n\r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/43233.zip", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://www.exploit-db.com/download/43233/"}]}