Lucene search

K
nessusThis script is Copyright (C) 2013-2023 and is owned by Tenable, Inc. or an Affiliate thereof.WIRESHARK_1_8_5.NASL
HistoryJan 30, 2013 - 12:00 a.m.

Wireshark 1.8.x < 1.8.5 Multiple Vulnerabilities

2013-01-3000:00:00
This script is Copyright (C) 2013-2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
12

2.9 Low

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:A/AC:M/Au:N/C:N/I:N/A:P

0.004 Low

EPSS

Percentile

72.9%

The installed version of Wireshark 1.8 is earlier than 1.8.5. It is, therefore, affected by the following vulnerabilities :

  • Errors exist related to the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors that could allow the application to enter infinite or large loops, thereby consuming excessive CPU resources. (Bugs 8036, 8037, 8038, 8040, 8041, 8042, 8043, 8198, 8199, 8222)

  • Errors exist related to the DCP-ETSI, ROHC, DTLS, MS-MMC, DTN, CLNP dissectors that could allow them to crash. (Bugs 7679, 7871, 7945, 8111, 8112, 8213)

  • An unspecified error could allow the dissection engine to crash. (Bug 8197)

  • An unspecified buffer overflow exists in the NTLMSSP dissector that has an unspecified impact.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(64362);
  script_version("1.12");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/03/09");

  script_cve_id(
    "CVE-2013-1572",
    "CVE-2013-1573",
    "CVE-2013-1574",
    "CVE-2013-1575",
    "CVE-2013-1576",
    "CVE-2013-1577",
    "CVE-2013-1578",
    "CVE-2013-1579",
    "CVE-2013-1580",
    "CVE-2013-1581",
    "CVE-2013-1582",
    "CVE-2013-1583",
    "CVE-2013-1584",
    "CVE-2013-1585",
    "CVE-2013-1586",
    "CVE-2013-1587",
    "CVE-2013-1588",
    "CVE-2013-1589",
    "CVE-2013-1590"
  );
  script_bugtraq_id(
    57615,
    57616,
    57618,
    57619,
    57620,
    57621,
    57622,
    57625,
    57626,
    57647
  );

  script_name(english:"Wireshark 1.8.x < 1.8.5 Multiple Vulnerabilities");
  script_summary(english:"Does a version check");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host contains an application that is affected by
multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The installed version of Wireshark 1.8 is earlier than 1.8.5.  It is,
therefore, affected by the following vulnerabilities :

  - Errors exist related to the Bluetooth HCI, CSN.1,
    DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols,
    MPLS, R3, RTPS, SDP, and SIP dissectors that could
    allow the application to enter infinite or large loops,
    thereby consuming excessive CPU resources. (Bugs 8036,
    8037, 8038, 8040, 8041, 8042, 8043, 8198, 8199, 8222)

  - Errors exist related to the DCP-ETSI, ROHC, DTLS,
    MS-MMC, DTN, CLNP dissectors that could allow them to
    crash. (Bugs 7679, 7871, 7945, 8111, 8112, 8213)

  - An unspecified error could allow the dissection engine
    to crash. (Bug 8197)

  - An unspecified buffer overflow exists in the NTLMSSP
    dissector that has an unspecified impact.");
  script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2013-01.html");
  script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2013-02.html");
  script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2013-03.html");
  script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2013-04.html");
  script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2013-05.html");
  script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2013-06.html");
  script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2013-07.html");
  script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2013-08.html");
  script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2013-09.html");
  script_set_attribute(attribute:"see_also", value:"http://www.wireshark.org/docs/relnotes/wireshark-1.8.5.html");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Wireshark version 1.8.5 or later.");
  script_set_cvss_base_vector("CVSS2#AV:A/AC:M/Au:N/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-1590");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/01/29");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/01/29");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/01/30");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:wireshark:wireshark");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2013-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("wireshark_installed.nasl");
  script_require_keys("SMB/Wireshark/Installed");

  exit(0);
}

include('vcf.inc');
get_kb_item_or_exit('SMB/Registry/Enumerated');

var app_info = vcf::get_app_info(app:'Wireshark', win_local:TRUE);

var constraints = [
  { 'min_version' : '1.8.0', 'max_version' : '1.8.4', 'fixed_version' : '1.8.5' }
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
VendorProductVersionCPE
wiresharkwiresharkcpe:/a:wireshark:wireshark

References

2.9 Low

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:A/AC:M/Au:N/C:N/I:N/A:P

0.004 Low

EPSS

Percentile

72.9%