The version of Wireshark installed on the remote Windows host is 2.2.x prior to 2.2.17, 2.4.x prior to 2.4.9, or 2.6.x prior to 2.6.3.
It is, therefore, affected by multiple vulnerabilities.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(117339);
script_version("1.5");
script_cvs_date("Date: 2019/11/01");
script_cve_id("CVE-2018-16056", "CVE-2018-16057", "CVE-2018-16058");
script_bugtraq_id(105174);
script_name(english:"Wireshark 2.2.x < 2.2.17 / 2.4.x < 2.4.9 / 2.6.x < 2.6.3 Multiple Vulnerabilities");
script_summary(english:"Checks the version of Wireshark.");
script_set_attribute(attribute:"synopsis", value:
"An application installed on the remote Windows host is affected by
multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of Wireshark installed on the remote Windows host is
2.2.x prior to 2.2.17, 2.4.x prior to 2.4.9, or 2.6.x prior to 2.6.3.
It is, therefore, affected by multiple vulnerabilities.");
script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2018-44.html");
script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2018-45.html");
script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2018-46.html");
script_set_attribute(attribute:"solution", value:
"Upgrade to Wireshark version 2.2.17 / 2.4.9 / 2.6.3 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-16056");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/08/29");
script_set_attribute(attribute:"patch_publication_date", value:"2018/08/29");
script_set_attribute(attribute:"plugin_publication_date", value:"2018/09/07");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:wireshark:wireshark");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("wireshark_installed.nasl");
script_require_keys("installed_sw/Wireshark", "SMB/Registry/Enumerated");
exit(0);
}
include("vcf.inc");
get_kb_item_or_exit("SMB/Registry/Enumerated");
app_info = vcf::get_app_info(app:"Wireshark", win_local:TRUE);
constraints = [
{ "min_version" : "2.2.0", "fixed_version" : "2.2.17" },
{ "min_version" : "2.4.0", "fixed_version" : "2.4.9" },
{ "min_version" : "2.6.0", "fixed_version" : "2.6.3" }
];
vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16056
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16057
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16058
www.wireshark.org/security/wnpa-sec-2018-44.html
www.wireshark.org/security/wnpa-sec-2018-45.html
www.wireshark.org/security/wnpa-sec-2018-46.html