The remote host is missing an update for the 'wireshark' package(s) announced via the referenced advisory. Wireshark 1.6.5 resolves multiple vulnerabilities including file parser, NULL pointer, and RLC dissector buffer overflow issues
Reporter | Title | Published | Views | Family All 92 |
---|---|---|---|---|
![]() | Mandriva Update for wireshark MDVSA-2012:080 (wireshark) | 3 Aug 201200:00 | – | openvas |
![]() | Mandriva Update for wireshark MDVSA-2012:080 (wireshark) | 3 Aug 201200:00 | – | openvas |
![]() | Mandriva Update for wireshark MDVSA-2012:015 (wireshark) | 3 Aug 201200:00 | – | openvas |
![]() | Mandriva Update for wireshark MDVSA-2012:042 (wireshark) | 3 Aug 201200:00 | – | openvas |
![]() | Mandriva Update for wireshark MDVSA-2012:042 (wireshark) | 3 Aug 201200:00 | – | openvas |
![]() | SUSE: Security Advisory (SUSE-SU-2012:0792-1) | 9 Jun 202100:00 | – | openvas |
![]() | Fedora Update for wireshark FEDORA-2012-10175 | 16 Jul 201200:00 | – | openvas |
![]() | Fedora Update for wireshark FEDORA-2012-10175 | 16 Jul 201200:00 | – | openvas |
![]() | Wireshark Multiple Denial of Service Vulnerabilities (Jul 2012) - Mac OS X | 5 Jul 201200:00 | – | openvas |
![]() | Wireshark Multiple Denial of Service Vulnerabilities - July 12 (Mac OS X) | 5 Jul 201200:00 | – | openvas |
Source | Link |
---|---|
mandriva | www.mandriva.com/en/support/security/advisories/ |
# SPDX-FileCopyrightText: 2012 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_xref(name:"URL", value:"http://www.mandriva.com/en/support/security/advisories/?name=MDVSA-2012:015");
script_oid("1.3.6.1.4.1.25623.1.0.831663");
script_cve_id("CVE-2012-2392", "CVE-2012-2393", "CVE-2012-2394");
script_version("2023-07-14T05:06:08+0000");
script_tag(name:"last_modification", value:"2023-07-14 05:06:08 +0000 (Fri, 14 Jul 2023)");
script_tag(name:"creation_date", value:"2012-08-03 09:59:43 +0530 (Fri, 03 Aug 2012)");
script_tag(name:"cvss_base", value:"3.3");
script_tag(name:"cvss_base_vector", value:"AV:A/AC:L/Au:N/C:N/I:N/A:P");
script_xref(name:"MDVSA", value:"2012:015");
script_name("Mandriva Update for wireshark MDVSA-2012:015 (wireshark)");
script_tag(name:"summary", value:"The remote host is missing an update for the 'wireshark'
package(s) announced via the referenced advisory.");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2012 Greenbone AG");
script_family("Mandrake Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/mandriva_mandrake_linux", "ssh/login/release", re:"ssh/login/release=MNDK_2011\.0");
script_tag(name:"affected", value:"wireshark on Mandriva Linux 2011.0");
script_tag(name:"solution", value:"Please Install the Updated Packages.");
script_tag(name:"insight", value:"Multiple file parser and NULL pointer vulnerabilities including a
RLC dissector buffer overflow was found and corrected in Wireshark.
This advisory provides the latest version of Wireshark (1.6.5 )
which is not vulnerable to these issues.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release) exit(0);
res = "";
if(release == "MNDK_2011.0")
{
if ((res = isrpmvuln(pkg:"dumpcap", rpm:"dumpcap~1.6.5~0.1", rls:"MNDK_2011.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libwireshark1", rpm:"libwireshark1~1.6.5~0.1", rls:"MNDK_2011.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libwireshark-devel", rpm:"libwireshark-devel~1.6.5~0.1", rls:"MNDK_2011.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"rawshark", rpm:"rawshark~1.6.5~0.1", rls:"MNDK_2011.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"tshark", rpm:"tshark~1.6.5~0.1", rls:"MNDK_2011.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"wireshark", rpm:"wireshark~1.6.5~0.1", rls:"MNDK_2011.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"wireshark-tools", rpm:"wireshark-tools~1.6.5~0.1", rls:"MNDK_2011.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64wireshark1", rpm:"lib64wireshark1~1.6.5~0.1", rls:"MNDK_2011.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"lib64wireshark-devel", rpm:"lib64wireshark-devel~1.6.5~0.1", rls:"MNDK_2011.0")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo