Wireshark Denial of Service Vulnerability (MacOSX)
2018-02-09T00:00:00
ID OPENVAS:1361412562310112214 Type openvas Reporter Copyright (C) 2018 Greenbone Networks GmbH Modified 2018-10-23T00:00:00
Description
This host is installed with Wireshark
and is prone to a denial of service (DoS) vulnerability.
###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_wireshark_dos_vuln_macosx.nasl 12026 2018-10-23 08:22:54Z mmartin $
#
# Wireshark Denial of Service Vulnerability (MacOSX)
#
# Authors:
# Adrian Steins <adrian.steins@greenbone.net>
#
# Copyright:
# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
CPE = "cpe:/a:wireshark:wireshark";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.112214");
script_version("$Revision: 12026 $");
script_cve_id("CVE-2018-6836");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_tag(name:"last_modification", value:"$Date: 2018-10-23 10:22:54 +0200 (Tue, 23 Oct 2018) $");
script_tag(name:"creation_date", value:"2018-02-09 15:34:57 +0100 (Fri, 09 Feb 2018)");
script_name("Wireshark Denial of Service Vulnerability (MacOSX)");
script_tag(name:"summary", value:"This host is installed with Wireshark
and is prone to a denial of service (DoS) vulnerability.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The netmonrec_comment_destroy function in wiretap/netmon.c in Wireshark performs a free operation
on an uninitialized memory address, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.");
script_tag(name:"impact", value:"Successful exploitation of this vulnerability
will allow remote attackers to cause a denial of service or possible have unspecified other impact.");
script_tag(name:"affected", value:"Wireshark up to and including version 2.4.4 on MacOSX.");
script_tag(name:"solution", value:"Update to version 2.6.0 or later.");
script_xref(name:"URL", value:"https://code.wireshark.org/review/#/c/25660/");
script_xref(name:"URL", value:"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14397");
script_xref(name:"URL", value:"https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=28960d79cca262ac6b974f339697b299a1e28fef");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"executable_version");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2018 Greenbone Networks GmbH");
script_family("Denial of Service");
script_dependencies("gb_wireshark_detect_macosx.nasl");
script_mandatory_keys("Wireshark/MacOSX/Version");
exit(0);
}
include("version_func.inc");
include("host_details.inc");
if(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) {
exit(0);
}
vers = infos['version'];
path = infos['location'];
if(version_is_less_equal(version:vers, test_version:"2.4.4")) {
report = report_fixed_ver(installed_version:vers, fixed_version:"2.6.0", install_path:path);
security_message(port:0, data:report);
exit(0);
}
exit(99);
{"id": "OPENVAS:1361412562310112214", "type": "openvas", "bulletinFamily": "scanner", "title": "Wireshark Denial of Service Vulnerability (MacOSX)", "description": "This host is installed with Wireshark\n and is prone to a denial of service (DoS) vulnerability.", "published": "2018-02-09T00:00:00", "modified": "2018-10-23T00:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310112214", "reporter": "Copyright (C) 2018 Greenbone Networks GmbH", "references": ["https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14397", "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=28960d79cca262ac6b974f339697b299a1e28fef", "https://code.wireshark.org/review/#/c/25660/"], "cvelist": ["CVE-2018-6836"], "lastseen": "2019-05-29T18:32:34", "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2018-6836"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310874649", "OPENVAS:1361412562310874872", "OPENVAS:1361412562310112213", "OPENVAS:1361412562310874288"]}, {"type": "nessus", "idList": ["FEDORA_2018-BFDAD62CD6.NASL", "FEDORA_2018-CDF3F8E8B0.NASL"]}], "modified": "2019-05-29T18:32:34", "rev": 2}, "score": {"value": 4.3, "vector": "NONE", "modified": "2019-05-29T18:32:34", "rev": 2}, "vulnersScore": 4.3}, "pluginID": "1361412562310112214", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_wireshark_dos_vuln_macosx.nasl 12026 2018-10-23 08:22:54Z mmartin $\n#\n# Wireshark Denial of Service Vulnerability (MacOSX)\n#\n# Authors:\n# Adrian Steins <adrian.steins@greenbone.net>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:wireshark:wireshark\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.112214\");\n script_version(\"$Revision: 12026 $\");\n script_cve_id(\"CVE-2018-6836\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-23 10:22:54 +0200 (Tue, 23 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2018-02-09 15:34:57 +0100 (Fri, 09 Feb 2018)\");\n\n script_name(\"Wireshark Denial of Service Vulnerability (MacOSX)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Wireshark\n and is prone to a denial of service (DoS) vulnerability.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The netmonrec_comment_destroy function in wiretap/netmon.c in Wireshark performs a free operation\n on an uninitialized memory address, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of this vulnerability\n will allow remote attackers to cause a denial of service or possible have unspecified other impact.\");\n\n script_tag(name:\"affected\", value:\"Wireshark up to and including version 2.4.4 on MacOSX.\");\n\n script_tag(name:\"solution\", value:\"Update to version 2.6.0 or later.\");\n\n script_xref(name:\"URL\", value:\"https://code.wireshark.org/review/#/c/25660/\");\n script_xref(name:\"URL\", value:\"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14397\");\n script_xref(name:\"URL\", value:\"https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=28960d79cca262ac6b974f339697b299a1e28fef\");\n\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Denial of Service\");\n script_dependencies(\"gb_wireshark_detect_macosx.nasl\");\n script_mandatory_keys(\"Wireshark/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) {\n exit(0);\n}\n\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less_equal(version:vers, test_version:\"2.4.4\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"2.6.0\", install_path:path);\n security_message(port:0, data:report);\n exit(0);\n}\n\nexit(99);\n", "naslFamily": "Denial of Service"}
{"cve": [{"lastseen": "2021-02-02T06:52:41", "description": "The netmonrec_comment_destroy function in wiretap/netmon.c in Wireshark through 2.4.4 performs a free operation on an uninitialized memory address, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", "edition": 7, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-02-08T07:29:00", "title": "CVE-2018-6836", "type": "cve", "cwe": ["CWE-763"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-6836"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/a:wireshark:wireshark:2.4.4"], "id": "CVE-2018-6836", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6836", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:wireshark:wireshark:2.4.4:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2019-05-29T18:32:34", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6836"], "description": "This host is installed with Wireshark\n and is prone to a denial of service (DoS) vulnerability.", "modified": "2018-10-23T00:00:00", "published": "2018-02-09T00:00:00", "id": "OPENVAS:1361412562310112213", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310112213", "type": "openvas", "title": "Wireshark Denial of Service Vulnerability (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_wireshark_dos_vuln_win.nasl 12026 2018-10-23 08:22:54Z mmartin $\n#\n# Wireshark Denial of Service Vulnerability (Windows)\n#\n# Authors:\n# Adrian Steins <adrian.steins@greenbone.net>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:wireshark:wireshark\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.112213\");\n script_version(\"$Revision: 12026 $\");\n script_cve_id(\"CVE-2018-6836\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-23 10:22:54 +0200 (Tue, 23 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2018-02-09 15:34:57 +0100 (Fri, 09 Feb 2018)\");\n\n script_name(\"Wireshark Denial of Service Vulnerability (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Wireshark\n and is prone to a denial of service (DoS) vulnerability.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The netmonrec_comment_destroy function in wiretap/netmon.c in Wireshark performs a free operation\n on an uninitialized memory address, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of this vulnerability\n will allow remote attackers to cause a denial of service or possible have unspecified other impact.\");\n\n script_tag(name:\"affected\", value:\"Wireshark up to and including version 2.4.4 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Update to version 2.6.0 or later.\");\n\n script_xref(name:\"URL\", value:\"https://code.wireshark.org/review/#/c/25660/\");\n script_xref(name:\"URL\", value:\"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14397\");\n script_xref(name:\"URL\", value:\"https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=28960d79cca262ac6b974f339697b299a1e28fef\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Denial of Service\");\n script_dependencies(\"gb_wireshark_detect_win.nasl\");\n script_mandatory_keys(\"Wireshark/Win/Ver\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) {\n exit(0);\n}\n\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less_equal(version:vers, test_version:\"2.4.4\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"2.6.0\", install_path:path);\n security_message(port:0, data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:33:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-7335", "CVE-2018-7336", "CVE-2018-5335", "CVE-2018-7419", "CVE-2017-9617", "CVE-2018-7320", "CVE-2018-7417", "CVE-2017-6014", "CVE-2018-7418", "CVE-2018-5334", "CVE-2018-7420", "CVE-2018-6836", "CVE-2017-9766", "CVE-2018-7334", "CVE-2018-7337", "CVE-2017-9616", "CVE-2017-17997"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-03-28T00:00:00", "id": "OPENVAS:1361412562310874288", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874288", "type": "openvas", "title": "Fedora Update for wireshark FEDORA-2018-cdf3f8e8b0", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_cdf3f8e8b0_wireshark_fc27.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for wireshark FEDORA-2018-cdf3f8e8b0\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874288\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-03-28 08:58:33 +0200 (Wed, 28 Mar 2018)\");\n script_cve_id(\"CVE-2018-7419\", \"CVE-2018-7418\", \"CVE-2018-7417\", \"CVE-2018-7420\",\n \"CVE-2018-7320\", \"CVE-2018-7336\", \"CVE-2018-7337\", \"CVE-2018-7334\",\n \"CVE-2018-7335\", \"CVE-2018-6836\", \"CVE-2018-5335\", \"CVE-2018-5334\",\n \"CVE-2017-6014\", \"CVE-2017-9616\", \"CVE-2017-9617\", \"CVE-2017-9766\",\n \"CVE-2017-17997\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for wireshark FEDORA-2018-cdf3f8e8b0\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'wireshark'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"wireshark on Fedora 27\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"FEDORA\", value:\"2018-cdf3f8e8b0\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2KD7XZZ37MHNPXTQLGQS6XHC754ZQMM6\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC27\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"wireshark\", rpm:\"wireshark~2.4.5~3.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:32:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-11354", "CVE-2018-7335", "CVE-2017-17084", "CVE-2018-7336", "CVE-2018-5335", "CVE-2018-11357", "CVE-2018-7419", "CVE-2018-11359", "CVE-2018-11361", "CVE-2018-11358", "CVE-2017-9617", "CVE-2018-11362", "CVE-2018-7320", "CVE-2018-7417", "CVE-2017-6014", "CVE-2017-17935", "CVE-2018-7418", "CVE-2017-17085", "CVE-2018-5334", "CVE-2017-15189", "CVE-2017-15191", "CVE-2017-13764", "CVE-2017-15190", "CVE-2018-7420", "CVE-2018-11360", "CVE-2017-13765", "CVE-2018-6836", "CVE-2017-9766", "CVE-2018-11356", "CVE-2018-7334", "CVE-2017-15192", "CVE-2017-13766", "CVE-2018-7337", "CVE-2017-15193", "CVE-2017-13767", "CVE-2017-9616", "CVE-2018-11355", "CVE-2017-17083"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-06-06T00:00:00", "id": "OPENVAS:1361412562310874649", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874649", "type": "openvas", "title": "Fedora Update for wireshark FEDORA-2018-d1cfa444d2", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_d1cfa444d2_wireshark_fc27.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for wireshark FEDORA-2018-d1cfa444d2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874649\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-06-06 10:25:48 +0200 (Wed, 06 Jun 2018)\");\n script_cve_id(\"CVE-2018-7419\", \"CVE-2018-7418\", \"CVE-2018-7417\", \"CVE-2018-7420\",\n \"CVE-2018-7320\", \"CVE-2018-7336\", \"CVE-2018-7337\", \"CVE-2018-7334\",\n \"CVE-2018-7335\", \"CVE-2018-6836\", \"CVE-2018-5335\", \"CVE-2018-5334\",\n \"CVE-2017-6014\", \"CVE-2017-9616\", \"CVE-2017-9617\", \"CVE-2017-9766\",\n \"CVE-2017-17935\", \"CVE-2017-17085\", \"CVE-2017-17084\", \"CVE-2017-17083\",\n \"CVE-2017-15189\", \"CVE-2017-15190\", \"CVE-2017-15191\", \"CVE-2017-15192\",\n \"CVE-2017-15193\", \"CVE-2017-13764\", \"CVE-2017-13765\", \"CVE-2017-13766\",\n \"CVE-2017-13767\", \"CVE-2018-11362\", \"CVE-2018-11361\", \"CVE-2018-11360\",\n \"CVE-2018-11359\", \"CVE-2018-11358\", \"CVE-2018-11357\", \"CVE-2018-11356\",\n \"CVE-2018-11355\", \"CVE-2018-11354\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for wireshark FEDORA-2018-d1cfa444d2\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'wireshark'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\non the target host.\");\n script_tag(name:\"affected\", value:\"wireshark on Fedora 27\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"FEDORA\", value:\"2018-d1cfa444d2\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S4TES6EYI77P55Y77OPJQCCKJKZ7EQBY\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC27\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"wireshark\", rpm:\"wireshark~2.6.1~1.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:33:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-7335", "CVE-2017-17084", "CVE-2018-14339", "CVE-2018-7336", "CVE-2018-5335", "CVE-2018-7419", "CVE-2018-14343", "CVE-2018-14367", "CVE-2017-9617", "CVE-2018-14341", "CVE-2018-7320", "CVE-2018-7417", "CVE-2017-6014", "CVE-2017-17935", "CVE-2018-7418", "CVE-2018-14344", "CVE-2017-17085", "CVE-2018-5334", "CVE-2017-15189", "CVE-2017-15191", "CVE-2017-13764", "CVE-2017-15190", "CVE-2018-7420", "CVE-2017-13765", "CVE-2018-6836", "CVE-2018-14369", "CVE-2017-9766", "CVE-2018-14370", "CVE-2018-14342", "CVE-2018-14368", "CVE-2018-7334", "CVE-2017-15192", "CVE-2017-13766", "CVE-2018-7337", "CVE-2018-14340", "CVE-2017-15193", "CVE-2017-13767", "CVE-2017-9616", "CVE-2017-17083"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-08-02T00:00:00", "id": "OPENVAS:1361412562310874872", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874872", "type": "openvas", "title": "Fedora Update for wireshark FEDORA-2018-9ef52861b5", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_9ef52861b5_wireshark_fc27.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for wireshark FEDORA-2018-9ef52861b5\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874872\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-08-02 06:01:38 +0200 (Thu, 02 Aug 2018)\");\n script_cve_id(\"CVE-2018-14339\", \"CVE-2018-14340\", \"CVE-2018-14341\", \"CVE-2018-14342\",\n \"CVE-2018-14343\", \"CVE-2018-14344\", \"CVE-2018-14367\", \"CVE-2018-14368\",\n \"CVE-2018-14369\", \"CVE-2018-14370\", \"CVE-2018-7419\", \"CVE-2018-7418\",\n \"CVE-2018-7417\", \"CVE-2018-7420\", \"CVE-2018-7320\", \"CVE-2018-7336\",\n \"CVE-2018-7337\", \"CVE-2018-7334\", \"CVE-2018-7335\", \"CVE-2018-6836\",\n \"CVE-2018-5335\", \"CVE-2018-5334\", \"CVE-2017-6014\", \"CVE-2017-9616\",\n \"CVE-2017-9617\", \"CVE-2017-9766\", \"CVE-2017-17935\", \"CVE-2017-17085\",\n \"CVE-2017-17084\", \"CVE-2017-17083\", \"CVE-2017-15189\", \"CVE-2017-15190\",\n \"CVE-2017-15191\", \"CVE-2017-15192\", \"CVE-2017-15193\", \"CVE-2017-13764\",\n \"CVE-2017-13765\", \"CVE-2017-13766\", \"CVE-2017-13767\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for wireshark FEDORA-2018-9ef52861b5\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'wireshark'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"wireshark on Fedora 27\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"FEDORA\", value:\"2018-9ef52861b5\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM62HSZGLJTWME5BBTQHN5RW6HL3PMPQ\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC27\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"wireshark\", rpm:\"wireshark~2.6.2~1.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "nessus": [{"lastseen": "2021-01-07T10:21:08", "description": "Removing dependency on wireshark metapackage from wireshark-cli\n\n----\n\nAdded wireshark-qt to wireshark metapackage\n\n----\n\n - New version 2.4.5\n\n - Contains fixes for CVE-2018-7419, CVE-2018-7418,\n CVE-2018-7417, CVE-2018-7420, CVE-2018-7320,\n CVE-2018-7336, CVE-2018-7337, CVE-2018-7334,\n CVE-2018-7335, CVE-2018-6836, CVE-2018-5335,\n CVE-2018-5334, CVE-2017-6014, CVE-2017-9616,\n CVE-2017-9617, CVE-2017-9766\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 11, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-01-03T00:00:00", "title": "Fedora 28 : 1:wireshark (2018-bfdad62cd6)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-7335", "CVE-2018-7336", "CVE-2018-5335", "CVE-2018-7419", "CVE-2017-9617", "CVE-2018-7320", "CVE-2018-7417", "CVE-2017-6014", "CVE-2018-7418", "CVE-2018-5334", "CVE-2018-7420", "CVE-2018-6836", "CVE-2017-9766", "CVE-2018-7334", "CVE-2018-7337", "CVE-2017-9616", "CVE-2017-17997"], "modified": "2019-01-03T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:1:wireshark", "cpe:/o:fedoraproject:fedora:28"], "id": "FEDORA_2018-BFDAD62CD6.NASL", "href": "https://www.tenable.com/plugins/nessus/120757", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2018-bfdad62cd6.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(120757);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2017-17997\", \"CVE-2017-6014\", \"CVE-2017-9616\", \"CVE-2017-9617\", \"CVE-2017-9766\", \"CVE-2018-5334\", \"CVE-2018-5335\", \"CVE-2018-6836\", \"CVE-2018-7320\", \"CVE-2018-7334\", \"CVE-2018-7335\", \"CVE-2018-7336\", \"CVE-2018-7337\", \"CVE-2018-7417\", \"CVE-2018-7418\", \"CVE-2018-7419\", \"CVE-2018-7420\");\n script_xref(name:\"FEDORA\", value:\"2018-bfdad62cd6\");\n\n script_name(english:\"Fedora 28 : 1:wireshark (2018-bfdad62cd6)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Removing dependency on wireshark metapackage from wireshark-cli\n\n----\n\nAdded wireshark-qt to wireshark metapackage\n\n----\n\n - New version 2.4.5\n\n - Contains fixes for CVE-2018-7419, CVE-2018-7418,\n CVE-2018-7417, CVE-2018-7420, CVE-2018-7320,\n CVE-2018-7336, CVE-2018-7337, CVE-2018-7334,\n CVE-2018-7335, CVE-2018-6836, CVE-2018-5335,\n CVE-2018-5334, CVE-2017-6014, CVE-2017-9616,\n CVE-2017-9617, CVE-2017-9766\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2018-bfdad62cd6\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected 1:wireshark package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-6836\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:1:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:28\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/02/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/04/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^28([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 28\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC28\", reference:\"wireshark-2.4.5-3.fc28\", epoch:\"1\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"1:wireshark\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:21:41", "description": "Removing dependency on wireshark metapackage from wireshark-cli\n\n----\n\nAdded wireshark-qt to wireshark metapackage\n\n----\n\n - New version 2.4.5\n\n - Contains fixes for CVE-2018-7419, CVE-2018-7418,\n CVE-2018-7417, CVE-2018-7420, CVE-2018-7320,\n CVE-2018-7336, CVE-2018-7337, CVE-2018-7334,\n CVE-2018-7335, CVE-2018-6836, CVE-2018-5335,\n CVE-2018-5334, CVE-2017-6014, CVE-2017-9616,\n CVE-2017-9617, CVE-2017-9766\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 18, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-03-28T00:00:00", "title": "Fedora 27 : 1:wireshark (2018-cdf3f8e8b0)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-7335", "CVE-2018-7336", "CVE-2018-5335", "CVE-2018-7419", "CVE-2017-9617", "CVE-2018-7320", "CVE-2018-7417", "CVE-2017-6014", "CVE-2018-7418", "CVE-2018-5334", "CVE-2018-7420", "CVE-2018-6836", "CVE-2017-9766", "CVE-2018-7334", "CVE-2018-7337", "CVE-2017-9616", "CVE-2017-17997"], "modified": "2018-03-28T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:27", "p-cpe:/a:fedoraproject:fedora:1:wireshark"], "id": "FEDORA_2018-CDF3F8E8B0.NASL", "href": "https://www.tenable.com/plugins/nessus/108674", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2018-cdf3f8e8b0.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(108674);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2017-17997\", \"CVE-2017-6014\", \"CVE-2017-9616\", \"CVE-2017-9617\", \"CVE-2017-9766\", \"CVE-2018-5334\", \"CVE-2018-5335\", \"CVE-2018-6836\", \"CVE-2018-7320\", \"CVE-2018-7334\", \"CVE-2018-7335\", \"CVE-2018-7336\", \"CVE-2018-7337\", \"CVE-2018-7417\", \"CVE-2018-7418\", \"CVE-2018-7419\", \"CVE-2018-7420\");\n script_xref(name:\"FEDORA\", value:\"2018-cdf3f8e8b0\");\n\n script_name(english:\"Fedora 27 : 1:wireshark (2018-cdf3f8e8b0)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Removing dependency on wireshark metapackage from wireshark-cli\n\n----\n\nAdded wireshark-qt to wireshark metapackage\n\n----\n\n - New version 2.4.5\n\n - Contains fixes for CVE-2018-7419, CVE-2018-7418,\n CVE-2018-7417, CVE-2018-7420, CVE-2018-7320,\n CVE-2018-7336, CVE-2018-7337, CVE-2018-7334,\n CVE-2018-7335, CVE-2018-6836, CVE-2018-5335,\n CVE-2018-5334, CVE-2017-6014, CVE-2017-9616,\n CVE-2017-9617, CVE-2017-9766\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2018-cdf3f8e8b0\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected 1:wireshark package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:1:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:27\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/02/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/03/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/03/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^27([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 27\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC27\", reference:\"wireshark-2.4.5-3.fc27\", epoch:\"1\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"1:wireshark\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "fedora": [{"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-17997", "CVE-2017-6014", "CVE-2017-9616", "CVE-2017-9617", "CVE-2017-9766", "CVE-2018-5334", "CVE-2018-5335", "CVE-2018-6836", "CVE-2018-7320", "CVE-2018-7334", "CVE-2018-7335", "CVE-2018-7336", "CVE-2018-7337", "CVE-2018-7417", "CVE-2018-7418", "CVE-2018-7419", "CVE-2018-7420"], "description": "Metapackage with installs wireshark-cli and wireshark-qt. ", "modified": "2018-03-27T20:17:34", "published": "2018-03-27T20:17:34", "id": "FEDORA:BFCC260BDC9A", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: wireshark-2.4.5-3.fc27", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-17997", "CVE-2017-6014", "CVE-2017-9616", "CVE-2017-9617", "CVE-2017-9766", "CVE-2018-5334", "CVE-2018-5335", "CVE-2018-6836", "CVE-2018-7320", "CVE-2018-7334", "CVE-2018-7335", "CVE-2018-7336", "CVE-2018-7337", "CVE-2018-7417", "CVE-2018-7418", "CVE-2018-7419", "CVE-2018-7420"], "description": "Metapackage with installs wireshark-cli and wireshark-qt. ", "modified": "2018-04-17T00:23:28", "published": "2018-04-17T00:23:28", "id": "FEDORA:A36566002E30", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 28 Update: wireshark-2.4.5-3.fc28", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-13764", "CVE-2017-13765", "CVE-2017-13766", "CVE-2017-15189", "CVE-2017-15190", "CVE-2017-15191", "CVE-2017-15193", "CVE-2017-17083", "CVE-2017-17084", "CVE-2017-17085", "CVE-2017-17935", "CVE-2017-6014", "CVE-2017-9617", "CVE-2017-9766", "CVE-2018-14339", "CVE-2018-14340", "CVE-2018-14341", "CVE-2018-14342", "CVE-2018-14343", "CVE-2018-14344", "CVE-2018-14367", "CVE-2018-14368", "CVE-2018-14369", "CVE-2018-14370", "CVE-2018-5334", "CVE-2018-5335", "CVE-2018-6836", "CVE-2018-7320", "CVE-2018-7334", "CVE-2018-7336", "CVE-2018-7337", "CVE-2018-7417", "CVE-2018-7418", "CVE-2018-7419"], "description": "Metapackage with installs wireshark-cli and wireshark-qt. ", "modified": "2018-08-01T17:56:04", "published": "2018-08-01T17:56:04", "id": "FEDORA:A3BB5642EA04", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: wireshark-2.6.2-1.fc27", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-13764", "CVE-2017-13765", "CVE-2017-13766", "CVE-2017-15189", "CVE-2017-15190", "CVE-2017-15191", "CVE-2017-15193", "CVE-2017-17083", "CVE-2017-17084", "CVE-2017-17085", "CVE-2017-17935", "CVE-2017-6014", "CVE-2017-9617", "CVE-2017-9766", "CVE-2018-11354", "CVE-2018-11355", "CVE-2018-11356", "CVE-2018-11357", "CVE-2018-11358", "CVE-2018-11359", "CVE-2018-11360", "CVE-2018-11361", "CVE-2018-11362", "CVE-2018-5334", "CVE-2018-5335", "CVE-2018-6836", "CVE-2018-7320", "CVE-2018-7334", "CVE-2018-7336", "CVE-2018-7337", "CVE-2018-7417", "CVE-2018-7418", "CVE-2018-7419"], "description": "Metapackage with installs wireshark-cli and wireshark-qt. ", "modified": "2018-06-05T14:11:28", "published": "2018-06-05T14:11:28", "id": "FEDORA:AA87961AC333", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: wireshark-2.6.1-1.fc27", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}]}