{"id": "OPENVAS:1361412562311220192425", "vendorId": null, "type": "openvas", "bulletinFamily": "scanner", "title": "Huawei EulerOS: Security Advisory for wireshark (EulerOS-SA-2019-2425)", "description": "The remote host is missing an update for the Huawei EulerOS\n ", "published": "2020-01-23T00:00:00", "modified": "2020-01-23T00:00:00", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}, "cvss2": {}, "cvss3": {}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220192425", "reporter": "Copyright (C) 2020 Greenbone Networks GmbH", "references": ["https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2425", "2019-2425"], "cvelist": ["CVE-2017-9347", "CVE-2015-8713", "CVE-2015-8717", "CVE-2016-5350", "CVE-2015-8714", "CVE-2016-2531", "CVE-2016-6505", "CVE-2016-2530", "CVE-2016-6510", "CVE-2016-4081", "CVE-2016-7177", "CVE-2015-8719", "CVE-2017-9349", "CVE-2016-7179", "CVE-2016-4077", "CVE-2015-8731", "CVE-2018-19622", "CVE-2018-14341", "CVE-2015-8723", "CVE-2018-7418", "CVE-2016-4085", "CVE-2018-5336", "CVE-2016-6508", "CVE-2016-5353", "CVE-2016-5359", "CVE-2018-16057", "CVE-2017-13765", "CVE-2015-8729", "CVE-2015-8721", "CVE-2016-9375", "CVE-2016-6507", "CVE-2017-9345", "CVE-2016-2532", "CVE-2017-7703", "CVE-2016-7958", "CVE-2015-8712", "CVE-2016-4006", "CVE-2016-2523", "CVE-2018-14340", "CVE-2015-8716", "CVE-2017-9352", "CVE-2015-8718", "CVE-2017-17083"], "immutableFields": [], "lastseen": "2020-01-27T18:34:20", "viewCount": 7, "enchantments": {"dependencies": {"references": [{"type": "altlinux", "idList": ["B0DA508DA36AD920AA0CE684AAC18E31"]}, {"type": "amazon", "idList": ["ALAS2-2020-1438"]}, {"type": "archlinux", "idList": ["ASA-201601-4", "ASA-201601-5", "ASA-201601-6", "ASA-201603-15", "ASA-201603-16", "ASA-201603-17", "ASA-201608-20", "ASA-201609-27", "ASA-201611-23", "ASA-201611-24", "ASA-201611-25", "ASA-201706-9", "ASA-201812-3"]}, {"type": "centos", "idList": ["CESA-2020:1047"]}, {"type": "cve", "idList": ["CVE-2015-8712", "CVE-2015-8713", "CVE-2015-8714", "CVE-2015-8716", "CVE-2015-8717", "CVE-2015-8718", "CVE-2015-8719", "CVE-2015-8721", "CVE-2015-8723", "CVE-2015-8729", "CVE-2015-8731", "CVE-2016-2523", "CVE-2016-2530", "CVE-2016-2531", "CVE-2016-2532", "CVE-2016-4006", "CVE-2016-4077", "CVE-2016-4081", "CVE-2016-4085", "CVE-2016-5350", "CVE-2016-5353", "CVE-2016-5359", "CVE-2016-6505", "CVE-2016-6507", "CVE-2016-6508", "CVE-2016-6510", "CVE-2016-7177", "CVE-2016-7179", "CVE-2016-7958", "CVE-2016-9375", "CVE-2017-13765", "CVE-2017-17083", "CVE-2017-7703", "CVE-2017-9345", "CVE-2017-9347", "CVE-2017-9349", "CVE-2017-9352", "CVE-2018-14340", "CVE-2018-14341", "CVE-2018-16057", "CVE-2018-19622", "CVE-2018-5336", "CVE-2018-7418"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1226-1:264C9", "DEBIAN:DLA-1258-1:7E441", "DEBIAN:DLA-1353-1:A8A6D", "DEBIAN:DLA-1451-1:18C33", "DEBIAN:DLA-1634-1:9CB4F", "DEBIAN:DLA-1729-1:A8068", "DEBIAN:DLA-497-1:1FD56", "DEBIAN:DLA-538-1:49D88", "DEBIAN:DLA-538-1:D08DE", "DEBIAN:DLA-595-1:3B5A6", "DEBIAN:DLA-595-1:B5710", "DEBIAN:DLA-632-1:1C450", "DEBIAN:DLA-632-1:68060", "DEBIAN:DLA-714-1:11A9D", "DEBIAN:DLA-714-1:DD512", "DEBIAN:DSA-3505-1:8B7DB", "DEBIAN:DSA-3516-1:79073", "DEBIAN:DSA-3585-1:31520", "DEBIAN:DSA-3615-1:8570A", "DEBIAN:DSA-3648-1:A2464", "DEBIAN:DSA-3671-1:D1DD8", "DEBIAN:DSA-3719-1:09113", "DEBIAN:DSA-3719-1:F0BAE", "DEBIAN:DSA-4060-1:D5D23", "DEBIAN:DSA-4101-1:FD9E6", "DEBIAN:DSA-4315-1:5D854", "DEBIAN:DSA-4359-1:68CD3"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2015-8712", "DEBIANCVE:CVE-2015-8713", "DEBIANCVE:CVE-2015-8714", "DEBIANCVE:CVE-2015-8716", "DEBIANCVE:CVE-2015-8717", "DEBIANCVE:CVE-2015-8718", "DEBIANCVE:CVE-2015-8719", "DEBIANCVE:CVE-2015-8721", "DEBIANCVE:CVE-2015-8723", "DEBIANCVE:CVE-2015-8729", "DEBIANCVE:CVE-2015-8731", "DEBIANCVE:CVE-2016-2523", "DEBIANCVE:CVE-2016-2530", "DEBIANCVE:CVE-2016-2531", "DEBIANCVE:CVE-2016-2532", "DEBIANCVE:CVE-2016-4006", "DEBIANCVE:CVE-2016-4077", "DEBIANCVE:CVE-2016-4081", "DEBIANCVE:CVE-2016-4085", "DEBIANCVE:CVE-2016-5350", "DEBIANCVE:CVE-2016-5353", "DEBIANCVE:CVE-2016-5359", "DEBIANCVE:CVE-2016-6505", "DEBIANCVE:CVE-2016-6507", "DEBIANCVE:CVE-2016-6508", "DEBIANCVE:CVE-2016-6510", "DEBIANCVE:CVE-2016-7177", "DEBIANCVE:CVE-2016-7179", "DEBIANCVE:CVE-2016-7958", "DEBIANCVE:CVE-2016-9375", "DEBIANCVE:CVE-2017-13765", "DEBIANCVE:CVE-2017-17083", "DEBIANCVE:CVE-2017-7703", "DEBIANCVE:CVE-2017-9345", "DEBIANCVE:CVE-2017-9347", "DEBIANCVE:CVE-2017-9349", "DEBIANCVE:CVE-2017-9352", "DEBIANCVE:CVE-2018-14340", "DEBIANCVE:CVE-2018-14341", "DEBIANCVE:CVE-2018-16057", "DEBIANCVE:CVE-2018-19622", "DEBIANCVE:CVE-2018-5336", "DEBIANCVE:CVE-2018-7418"]}, {"type": "f5", "idList": ["F5:K01837042", "F5:K02215905", "F5:K34035645", "F5:K87669052", "SOL01837042", "SOL87669052"]}, {"type": "fedora", "idList": ["FEDORA:05CC8610B02D", "FEDORA:134CB607927B", "FEDORA:1D3596042F2D", "FEDORA:4413B6120A17", "FEDORA:69A7A604D2CE", "FEDORA:8511863409C2", "FEDORA:A36566002E30", "FEDORA:A3BB5642EA04", "FEDORA:A65C46509BD7", "FEDORA:AA87961AC333", "FEDORA:BB0F9605F088", "FEDORA:BFCC260BDC9A", "FEDORA:C67E26076F65", "FEDORA:D3A5060567DB", "FEDORA:DC811602173E", "FEDORA:E1F03604CCFB"]}, {"type": "freebsd", "idList": ["313E9557-41E8-11E6-AB34-002590263BF5", "45117749-DF55-11E5-B2BD-002590263BF5", "4B228E69-22E1-4019-AFD0-8AA716D0EC0B", "610101EA-5B6A-11E6-B334-002590263BF5", "7E36C369-10C0-11E6-94FA-002590263BF5", "7FFF2B16-B0EE-11E6-86B8-589CFC054129"]}, {"type": "gentoo", "idList": ["GLSA-201604-05", "GLSA-201706-12"]}, {"type": "kaspersky", "idList": ["KLA10730", "KLA10763", "KLA10796", "KLA10851", "KLA10867", "KLA10905", "KLA11020", "KLA11034", "KLA11094", "KLA11151", "KLA11176", "KLA11293", "KLA11311", "KLA11377"]}, {"type": "kitploit", "idList": ["KITPLOIT:2973941148692546578"]}, {"type": "mageia", "idList": ["MGASA-2016-0091", "MGASA-2016-0153", "MGASA-2016-0223", "MGASA-2016-0275", "MGASA-2016-0321", "MGASA-2016-0391", "MGASA-2017-0113", "MGASA-2017-0161", "MGASA-2017-0445", "MGASA-2018-0071", "MGASA-2018-0151", "MGASA-2018-0320", "MGASA-2018-0370"]}, {"type": "nessus", "idList": ["AL2_ALAS-2020-1438.NASL", "CENTOS_RHSA-2020-1047.NASL", "DEBIAN_DLA-1226.NASL", "DEBIAN_DLA-1258.NASL", "DEBIAN_DLA-1353.NASL", "DEBIAN_DLA-1451.NASL", "DEBIAN_DLA-1634.NASL", "DEBIAN_DLA-1729.NASL", "DEBIAN_DLA-497.NASL", "DEBIAN_DLA-538.NASL", "DEBIAN_DLA-595.NASL", "DEBIAN_DLA-632.NASL", "DEBIAN_DLA-714.NASL", "DEBIAN_DSA-3505.NASL", "DEBIAN_DSA-3516.NASL", "DEBIAN_DSA-3585.NASL", "DEBIAN_DSA-3615.NASL", "DEBIAN_DSA-3648.NASL", "DEBIAN_DSA-3671.NASL", "DEBIAN_DSA-3719.NASL", "DEBIAN_DSA-4060.NASL", "DEBIAN_DSA-4101.NASL", "DEBIAN_DSA-4315.NASL", "DEBIAN_DSA-4359.NASL", "EULEROS_SA-2019-2425.NASL", "EULEROS_SA-2020-2275.NASL", "EULEROS_SA-2021-1859.NASL", "F5_BIGIP_SOL01837042.NASL", "F5_BIGIP_SOL34035645.NASL", "FEDORA_2017-3997279E65.NASL", "FEDORA_2017-9FD430DBA0.NASL", "FEDORA_2018-1B6CB1DF72.NASL", "FEDORA_2018-89413A04E0.NASL", "FEDORA_2018-9EF52861B5.NASL", "FEDORA_2018-B7A58187BA.NASL", "FEDORA_2018-BFDAD62CD6.NASL", "FEDORA_2018-CB410A3812.NASL", "FEDORA_2018-CDF3F8E8B0.NASL", "FEDORA_2018-D56C428F9E.NASL", "FREEBSD_PKG_313E955741E811E6AB34002590263BF5.NASL", "FREEBSD_PKG_45117749DF5511E5B2BD002590263BF5.NASL", "FREEBSD_PKG_4B228E6922E14019AFD08AA716D0EC0B.NASL", "FREEBSD_PKG_610101EA5B6A11E6B334002590263BF5.NASL", "FREEBSD_PKG_7E36C36910C011E694FA002590263BF5.NASL", "FREEBSD_PKG_7FFF2B16B0EE11E686B8589CFC054129.NASL", "GENTOO_GLSA-201604-05.NASL", "GENTOO_GLSA-201706-12.NASL", "MACOSX_WIRESHARK_1_12_10.NASL", "MACOSX_WIRESHARK_1_12_11.NASL", "MACOSX_WIRESHARK_2_0_2.NASL", "MACOSX_WIRESHARK_2_0_3.NASL", "MACOSX_WIRESHARK_2_0_6.NASL", "MACOSX_WIRESHARK_2_2_6.NASL", "MACOSX_WIRESHARK_2_2_7.NASL", "MACOSX_WIRESHARK_2_4_11.NASL", "MACOSX_WIRESHARK_2_4_3.NASL", "MACOSX_WIRESHARK_2_4_4.NASL", "MACOSX_WIRESHARK_2_6_2.NASL", "MACOSX_WIRESHARK_2_6_3.NASL", "MACOSX_WIRESHARK_2_6_5.NASL", "NEWSTART_CGSL_NS-SA-2020-0064_WIRESHARK.NASL", "NEWSTART_CGSL_NS-SA-2020-0097_WIRESHARK.NASL", "OPENSUSE-2016-12.NASL", "OPENSUSE-2016-2923.NASL", "OPENSUSE-2016-301.NASL", "OPENSUSE-2016-302.NASL", "OPENSUSE-2016-737.NASL", "OPENSUSE-2016-947.NASL", "OPENSUSE-2017-1337.NASL", "OPENSUSE-2017-503.NASL", "OPENSUSE-2017-674.NASL", "OPENSUSE-2017-995.NASL", "OPENSUSE-2018-1620.NASL", "OPENSUSE-2018-210.NASL", "OPENSUSE-2018-32.NASL", "OPENSUSE-2018-792.NASL", "OPENSUSE-2018-793.NASL", "OPENSUSE-2018-949.NASL", "OPENSUSE-2018-972.NASL", "OPENSUSE-2019-1045.NASL", "OPENSUSE-2019-557.NASL", "OPENSUSE-2019-666.NASL", "OPENSUSE-2020-362.NASL", "REDHAT-RHSA-2020-1047.NASL", "SL_20200407_WIRESHARK_ON_SL7_X.NASL", "SUSE_SU-2016-0109-1.NASL", "SUSE_SU-2016-0110-1.NASL", "SUSE_SU-2016-1344-1.NASL", "SUSE_SU-2016-1345-1.NASL", "SUSE_SU-2016-2212-1.NASL", "SUSE_SU-2016-2453-1.NASL", "SUSE_SU-2017-1174-1.NASL", "SUSE_SU-2017-1442-1.NASL", "SUSE_SU-2017-1663-1.NASL", "SUSE_SU-2017-1664-1.NASL", "SUSE_SU-2017-2555-1.NASL", "SUSE_SU-2017-3436-1.NASL", "SUSE_SU-2018-0054-1.NASL", "SUSE_SU-2018-0179-1.NASL", "SUSE_SU-2018-0191-1.NASL", "SUSE_SU-2018-0811-1.NASL", "SUSE_SU-2018-0867-1.NASL", "SUSE_SU-2018-2301-1.NASL", "SUSE_SU-2018-2412-1.NASL", "SUSE_SU-2018-2872-1.NASL", "SUSE_SU-2018-2889-1.NASL", "SUSE_SU-2018-2891-1.NASL", "SUSE_SU-2018-2891-2.NASL", "SUSE_SU-2018-4295-1.NASL", "SUSE_SU-2018-4298-1.NASL", "SUSE_SU-2020-0693-1.NASL", "WIRESHARK_1_12_10.NASL", "WIRESHARK_1_12_11.NASL", "WIRESHARK_1_12_12.NASL", "WIRESHARK_1_12_13.NASL", "WIRESHARK_1_12_9.NASL", "WIRESHARK_2_0_1.NASL", "WIRESHARK_2_0_15.NASL", "WIRESHARK_2_0_2.NASL", "WIRESHARK_2_0_3.NASL", "WIRESHARK_2_0_4.NASL", "WIRESHARK_2_0_5.NASL", "WIRESHARK_2_0_6.NASL", "WIRESHARK_2_2_2.NASL", "WIRESHARK_2_2_6.NASL", "WIRESHARK_2_2_7.NASL", "WIRESHARK_2_2_9.NASL", "WIRESHARK_2_4_1.NASL", "WIRESHARK_2_4_11.NASL", "WIRESHARK_2_4_3.NASL", "WIRESHARK_2_4_4.NASL", "WIRESHARK_2_6_2.NASL", "WIRESHARK_2_6_3.NASL", "WIRESHARK_2_6_5.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310112242", "OPENVAS:1361412562310112243", "OPENVAS:1361412562310121461", "OPENVAS:1361412562310131246", "OPENVAS:1361412562310131296", "OPENVAS:1361412562310703505", "OPENVAS:1361412562310703516", "OPENVAS:1361412562310703585", "OPENVAS:1361412562310703615", "OPENVAS:1361412562310703648", "OPENVAS:1361412562310703671", "OPENVAS:1361412562310703719", "OPENVAS:1361412562310704060", "OPENVAS:1361412562310704101", "OPENVAS:1361412562310704315", "OPENVAS:1361412562310704359", "OPENVAS:1361412562310806945", "OPENVAS:1361412562310806946", "OPENVAS:1361412562310806947", "OPENVAS:1361412562310806948", "OPENVAS:1361412562310807448", "OPENVAS:1361412562310807449", "OPENVAS:1361412562310807575", "OPENVAS:1361412562310807576", "OPENVAS:1361412562310807577", "OPENVAS:1361412562310807578", "OPENVAS:1361412562310807579", "OPENVAS:1361412562310807580", "OPENVAS:1361412562310808287", "OPENVAS:1361412562310808288", "OPENVAS:1361412562310808289", "OPENVAS:1361412562310808290", "OPENVAS:1361412562310808298", "OPENVAS:1361412562310809048", "OPENVAS:1361412562310809049", "OPENVAS:1361412562310809100", "OPENVAS:1361412562310809102", "OPENVAS:1361412562310809103", "OPENVAS:1361412562310809803", "OPENVAS:1361412562310809810", "OPENVAS:1361412562310810699", "OPENVAS:1361412562310811000", "OPENVAS:1361412562310811001", "OPENVAS:1361412562310811002", "OPENVAS:1361412562310811070", "OPENVAS:1361412562310811071", "OPENVAS:1361412562310811072", "OPENVAS:1361412562310811073", "OPENVAS:1361412562310811596", "OPENVAS:1361412562310811597", "OPENVAS:1361412562310812259", "OPENVAS:1361412562310812260", "OPENVAS:1361412562310812632", "OPENVAS:1361412562310812633", "OPENVAS:1361412562310813586", "OPENVAS:1361412562310813587", "OPENVAS:1361412562310813881", "OPENVAS:1361412562310813882", "OPENVAS:1361412562310814514", "OPENVAS:1361412562310814515", "OPENVAS:1361412562310851832", "OPENVAS:1361412562310851874", "OPENVAS:1361412562310851990", "OPENVAS:1361412562310852018", "OPENVAS:1361412562310852219", "OPENVAS:1361412562310853075", "OPENVAS:1361412562310873890", "OPENVAS:1361412562310873992", "OPENVAS:1361412562310874288", "OPENVAS:1361412562310874649", "OPENVAS:1361412562310874872", "OPENVAS:1361412562310875300", "OPENVAS:1361412562310875367", "OPENVAS:1361412562310875436", "OPENVAS:1361412562310875646", "OPENVAS:1361412562310875672", "OPENVAS:1361412562310875889", "OPENVAS:1361412562310876150", "OPENVAS:1361412562310876728", "OPENVAS:1361412562310891258", "OPENVAS:1361412562310891353", "OPENVAS:1361412562310891451", "OPENVAS:1361412562310891634", "OPENVAS:1361412562310891729", "OPENVAS:703505", "OPENVAS:703516", "OPENVAS:703585", "OPENVAS:703615", "OPENVAS:703648", "OPENVAS:703671", "OPENVAS:703719"]}, {"type": "oracle", "idList": ["ORACLE:CPUAPR2020"]}, {"type": "oraclelinux", "idList": ["ELSA-2020-1047"]}, {"type": "osv", "idList": ["OSV:DLA-1226-1", "OSV:DLA-1258-1", "OSV:DLA-1353-1", "OSV:DLA-1451-1", "OSV:DLA-1634-1", "OSV:DLA-1729-1", "OSV:DLA-497-1", "OSV:DLA-538-1", "OSV:DLA-595-1", "OSV:DLA-632-1", "OSV:DLA-714-1", "OSV:DSA-3505-1", "OSV:DSA-3516-1", "OSV:DSA-3585-1", "OSV:DSA-3615-1", "OSV:DSA-3648-1", "OSV:DSA-3671-1", "OSV:DSA-3719-1", "OSV:DSA-4060-1", "OSV:DSA-4101-1", "OSV:DSA-4315-1", "OSV:DSA-4359-1"]}, {"type": "redhat", "idList": ["RHSA-2020:1047"]}, {"type": "redhatcve", "idList": ["RH:CVE-2016-5350", "RH:CVE-2016-5353", "RH:CVE-2016-5359", "RH:CVE-2016-6505", "RH:CVE-2016-6507", "RH:CVE-2016-6508", "RH:CVE-2016-6510", "RH:CVE-2016-7177", "RH:CVE-2016-7179", "RH:CVE-2016-7958", "RH:CVE-2016-9375", "RH:CVE-2017-13765", "RH:CVE-2017-17083", "RH:CVE-2017-7703", "RH:CVE-2017-9345", "RH:CVE-2017-9347", "RH:CVE-2017-9349", "RH:CVE-2017-9352", "RH:CVE-2018-14340", "RH:CVE-2018-14341", "RH:CVE-2018-16057", "RH:CVE-2018-19622", "RH:CVE-2018-5336", "RH:CVE-2018-7418"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2018:2184-1", "OPENSUSE-SU-2018:2188-1", "OPENSUSE-SU-2018:2587-1", "OPENSUSE-SU-2018:2628-1", "OPENSUSE-SU-2018:4307-1", "OPENSUSE-SU-2020:0362-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2015-8712", "UB:CVE-2015-8713", "UB:CVE-2015-8714", "UB:CVE-2015-8716", "UB:CVE-2015-8717", "UB:CVE-2015-8718", "UB:CVE-2015-8719", "UB:CVE-2015-8721", "UB:CVE-2015-8723", "UB:CVE-2015-8729", "UB:CVE-2015-8731", "UB:CVE-2016-2523", "UB:CVE-2016-2530", "UB:CVE-2016-2531", "UB:CVE-2016-2532", "UB:CVE-2016-4006", "UB:CVE-2016-4077", "UB:CVE-2016-4081", "UB:CVE-2016-4085", "UB:CVE-2016-5350", "UB:CVE-2016-5353", "UB:CVE-2016-5359", "UB:CVE-2016-6505", "UB:CVE-2016-6507", "UB:CVE-2016-6508", "UB:CVE-2016-6510", "UB:CVE-2016-7177", "UB:CVE-2016-7179", "UB:CVE-2016-7958", "UB:CVE-2016-9375", "UB:CVE-2017-13765", "UB:CVE-2017-17083", "UB:CVE-2017-7703", "UB:CVE-2017-9345", "UB:CVE-2017-9347", "UB:CVE-2017-9349", "UB:CVE-2017-9352", "UB:CVE-2018-14340", "UB:CVE-2018-14341", "UB:CVE-2018-16057", "UB:CVE-2018-19622", "UB:CVE-2018-5336", "UB:CVE-2018-7418"]}, {"type": "veracode", "idList": ["VERACODE:22851", "VERACODE:22852", "VERACODE:22854", "VERACODE:22855", "VERACODE:22856"]}, {"type": "zdt", "idList": ["1337DAY-ID-25705", "1337DAY-ID-25709", "1337DAY-ID-25714", "1337DAY-ID-26106", "1337DAY-ID-27901"]}]}, "score": {"value": -0.2, "vector": "NONE"}, "backreferences": {"references": [{"type": "amazon", "idList": ["ALAS2-2020-1438"]}, {"type": "archlinux", "idList": ["ASA-201601-4", "ASA-201601-5", "ASA-201601-6", "ASA-201603-15", "ASA-201603-16", "ASA-201603-17"]}, {"type": "centos", "idList": ["CESA-2020:1047"]}, {"type": "cve", "idList": ["CVE-2015-8712", "CVE-2015-8713", "CVE-2015-8714", "CVE-2015-8716", "CVE-2015-8717", "CVE-2015-8718", "CVE-2015-8719", "CVE-2015-8721", "CVE-2015-8723", "CVE-2015-8729", "CVE-2015-8731", "CVE-2016-2523", "CVE-2016-2530", "CVE-2016-2531", "CVE-2016-2532", "CVE-2017-9345", "CVE-2017-9347", "CVE-2017-9349", "CVE-2017-9352"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1226-1:264C9", "DEBIAN:DLA-1258-1:7E441", "DEBIAN:DLA-1353-1:A8A6D", "DEBIAN:DLA-1451-1:18C33", "DEBIAN:DSA-3615-1:8570A", "DEBIAN:DSA-3648-1:A2464", "DEBIAN:DSA-3671-1:D1DD8", "DEBIAN:DSA-4060-1:D5D23", "DEBIAN:DSA-4101-1:FD9E6", "DEBIAN:DSA-4315-1:5D854"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2016-7958", "DEBIANCVE:CVE-2017-13765", "DEBIANCVE:CVE-2017-17083", "DEBIANCVE:CVE-2017-7703", "DEBIANCVE:CVE-2017-9345", "DEBIANCVE:CVE-2017-9347", "DEBIANCVE:CVE-2017-9349", "DEBIANCVE:CVE-2017-9352", "DEBIANCVE:CVE-2018-14340", "DEBIANCVE:CVE-2018-14341", "DEBIANCVE:CVE-2018-16057", "DEBIANCVE:CVE-2018-19622", "DEBIANCVE:CVE-2018-5336", "DEBIANCVE:CVE-2018-7418"]}, {"type": "f5", "idList": ["F5:K34035645", "SOL87669052"]}, {"type": "fedora", "idList": ["FEDORA:05CC8610B02D", "FEDORA:134CB607927B", "FEDORA:4413B6120A17", "FEDORA:69A7A604D2CE", "FEDORA:8511863409C2", "FEDORA:A36566002E30", "FEDORA:A3BB5642EA04", "FEDORA:AA87961AC333", "FEDORA:BB0F9605F088", "FEDORA:BFCC260BDC9A", "FEDORA:C67E26076F65", "FEDORA:D3A5060567DB", "FEDORA:DC811602173E", "FEDORA:E1F03604CCFB"]}, {"type": "freebsd", "idList": ["45117749-DF55-11E5-B2BD-002590263BF5"]}, {"type": "gentoo", "idList": ["GLSA-201706-12"]}, {"type": "kaspersky", "idList": ["KLA11020", "KLA11034", "KLA11293"]}, {"type": "kitploit", "idList": ["KITPLOIT:2973941148692546578"]}, {"type": "metasploit", "idList": ["MSF:ILITIES/ALPINE-LINUX-CVE-2018-16057/", "MSF:ILITIES/F5-BIG-IP-CVE-2018-16057/", "MSF:ILITIES/REDHAT_LINUX-CVE-2018-16057/", "MSF:ILITIES/SUSE-CVE-2018-16057/"]}, {"type": "nessus", "idList": ["CENTOS_RHSA-2020-1047.NASL", "DEBIAN_DLA-1451.NASL", "DEBIAN_DSA-4315.NASL", "FEDORA_2018-9EF52861B5.NASL", "FREEBSD_PKG_45117749DF5511E5B2BD002590263BF5.NASL", "GENTOO_GLSA-201706-12.NASL", "MACOSX_WIRESHARK_1_12_10.NASL", "MACOSX_WIRESHARK_2_0_2.NASL", "MACOSX_WIRESHARK_2_2_7.NASL", "OPENSUSE-2016-301.NASL", "OPENSUSE-2016-302.NASL", "OPENSUSE-2017-674.NASL", "REDHAT-RHSA-2020-1047.NASL", "WIRESHARK_1_12_10.NASL", "WIRESHARK_2_0_1.NASL", "WIRESHARK_2_0_2.NASL", "WIRESHARK_2_2_7.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310809049", "OPENVAS:1361412562310809100", "OPENVAS:1361412562310810699", "OPENVAS:1361412562310811000", "OPENVAS:1361412562310811001", "OPENVAS:1361412562310811002", "OPENVAS:1361412562310811070", "OPENVAS:1361412562310811071", "OPENVAS:1361412562310811072", "OPENVAS:1361412562310811073", "OPENVAS:1361412562310874872", "OPENVAS:1361412562310891451"]}, {"type": "oraclelinux", "idList": ["ELSA-2020-1047"]}, {"type": "redhat", "idList": ["RHSA-2020:1047"]}, {"type": "redhatcve", "idList": ["RH:CVE-2018-14340", "RH:CVE-2018-14341", "RH:CVE-2018-16057", "RH:CVE-2018-19622", "RH:CVE-2018-5336", "RH:CVE-2018-7418"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2018:2184-1", "OPENSUSE-SU-2018:2188-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2018-14340", "UB:CVE-2018-14341", "UB:CVE-2018-16057", "UB:CVE-2018-19622", "UB:CVE-2018-7418"]}, {"type": "zdt", "idList": ["1337DAY-ID-27901"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2017-9347", "epss": "0.008090000", "percentile": "0.791270000", "modified": "2023-03-15"}, {"cve": "CVE-2015-8713", "epss": "0.002600000", "percentile": "0.620160000", "modified": "2023-03-15"}, {"cve": "CVE-2015-8717", "epss": "0.002470000", "percentile": "0.608110000", "modified": "2023-03-15"}, {"cve": "CVE-2016-5350", "epss": "0.003640000", "percentile": "0.680520000", "modified": "2023-03-15"}, {"cve": "CVE-2015-8714", "epss": "0.002470000", "percentile": "0.608110000", "modified": "2023-03-15"}, {"cve": "CVE-2016-2531", "epss": "0.003920000", "percentile": "0.692080000", "modified": "2023-03-15"}, {"cve": "CVE-2016-6505", "epss": "0.013730000", "percentile": "0.842140000", "modified": "2023-03-15"}, {"cve": "CVE-2016-2530", "epss": "0.003920000", "percentile": "0.692080000", "modified": "2023-03-15"}, {"cve": "CVE-2016-6510", "epss": "0.003520000", "percentile": "0.675010000", "modified": "2023-03-15"}, {"cve": "CVE-2016-4081", "epss": "0.003640000", "percentile": "0.680520000", "modified": "2023-03-15"}, {"cve": "CVE-2016-7177", "epss": "0.003110000", "percentile": "0.653280000", "modified": "2023-03-15"}, {"cve": "CVE-2015-8719", "epss": "0.002470000", "percentile": "0.608110000", "modified": "2023-03-15"}, {"cve": "CVE-2017-9349", "epss": "0.002740000", "percentile": "0.630180000", "modified": "2023-03-15"}, {"cve": "CVE-2016-7179", "epss": "0.002950000", "percentile": "0.644850000", "modified": "2023-03-15"}, {"cve": "CVE-2016-4077", "epss": "0.008170000", "percentile": "0.792200000", "modified": "2023-03-15"}, {"cve": "CVE-2015-8731", "epss": "0.003040000", "percentile": "0.650040000", "modified": "2023-03-15"}, {"cve": "CVE-2018-19622", "epss": "0.001580000", "percentile": "0.506190000", "modified": "2023-03-15"}, {"cve": "CVE-2018-14341", "epss": "0.001880000", "percentile": "0.545270000", "modified": "2023-03-15"}, {"cve": "CVE-2015-8723", "epss": "0.003220000", "percentile": "0.659690000", "modified": "2023-03-15"}, {"cve": "CVE-2018-7418", "epss": "0.001830000", "percentile": "0.538380000", "modified": "2023-03-15"}, {"cve": "CVE-2016-4085", "epss": "0.001610000", "percentile": "0.510450000", "modified": "2023-03-15"}, {"cve": "CVE-2018-5336", "epss": "0.003080000", "percentile": "0.652000000", "modified": "2023-03-15"}, {"cve": "CVE-2016-6508", "epss": "0.003060000", "percentile": "0.650750000", "modified": "2023-03-15"}, {"cve": "CVE-2016-5353", "epss": "0.003190000", "percentile": "0.658040000", "modified": "2023-03-15"}, {"cve": "CVE-2016-5359", "epss": "0.002520000", "percentile": "0.613040000", "modified": "2023-03-15"}, {"cve": "CVE-2018-16057", "epss": "0.001900000", "percentile": "0.547820000", "modified": "2023-03-15"}, {"cve": "CVE-2017-13765", "epss": "0.003320000", "percentile": "0.664990000", "modified": "2023-03-15"}, {"cve": "CVE-2015-8729", "epss": "0.003040000", "percentile": "0.650040000", "modified": "2023-03-15"}, {"cve": "CVE-2015-8721", "epss": "0.002670000", "percentile": "0.625250000", "modified": "2023-03-15"}, {"cve": "CVE-2016-9375", "epss": "0.002190000", "percentile": "0.581280000", "modified": "2023-03-15"}, {"cve": "CVE-2016-6507", "epss": "0.003060000", "percentile": "0.650750000", "modified": "2023-03-15"}, {"cve": "CVE-2017-9345", "epss": "0.003200000", "percentile": "0.658600000", "modified": "2023-03-15"}, {"cve": "CVE-2016-2532", "epss": "0.003920000", "percentile": "0.692080000", "modified": "2023-03-15"}, {"cve": "CVE-2017-7703", "epss": "0.001760000", "percentile": "0.530270000", "modified": "2023-03-15"}, {"cve": "CVE-2016-7958", "epss": "0.003110000", "percentile": "0.653580000", "modified": "2023-03-15"}, {"cve": "CVE-2015-8712", "epss": "0.002470000", "percentile": "0.608110000", "modified": "2023-03-15"}, {"cve": "CVE-2016-4006", "epss": "0.003490000", "percentile": "0.673270000", "modified": "2023-03-15"}, {"cve": "CVE-2016-2523", "epss": "0.003920000", "percentile": "0.692080000", "modified": "2023-03-15"}, {"cve": "CVE-2018-14340", "epss": "0.001670000", "percentile": "0.517190000", "modified": "2023-03-15"}, {"cve": "CVE-2015-8716", "epss": "0.002470000", "percentile": "0.608110000", "modified": "2023-03-15"}, {"cve": "CVE-2017-9352", "epss": "0.002340000", "percentile": "0.596940000", "modified": "2023-03-15"}, {"cve": "CVE-2015-8718", "epss": "0.002470000", "percentile": "0.608110000", "modified": "2023-03-15"}, {"cve": "CVE-2017-17083", "epss": "0.003440000", "percentile": "0.670550000", "modified": "2023-03-15"}], "vulnersScore": -0.2}, "_state": {"dependencies": 1678957314, "score": 1678957448, "epss": 1678957426}, "_internal": {"score_hash": "a0087293245673d6a5e97726d0c33aa2"}, "pluginID": "1361412562311220192425", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.2425\");\n script_version(\"2020-01-23T15:31:18+0000\");\n script_cve_id(\"CVE-2015-8712\", \"CVE-2015-8713\", \"CVE-2015-8714\", \"CVE-2015-8716\", \"CVE-2015-8717\", \"CVE-2015-8718\", \"CVE-2015-8719\", \"CVE-2015-8721\", \"CVE-2015-8723\", \"CVE-2015-8729\", \"CVE-2015-8731\", \"CVE-2016-2523\", \"CVE-2016-2530\", \"CVE-2016-2531\", \"CVE-2016-2532\", \"CVE-2016-4006\", \"CVE-2016-4077\", \"CVE-2016-4081\", \"CVE-2016-4085\", \"CVE-2016-5350\", \"CVE-2016-5353\", \"CVE-2016-5359\", \"CVE-2016-6505\", \"CVE-2016-6507\", \"CVE-2016-6508\", \"CVE-2016-6510\", \"CVE-2016-7177\", \"CVE-2016-7179\", \"CVE-2016-7958\", \"CVE-2016-9375\", \"CVE-2017-13765\", \"CVE-2017-17083\", \"CVE-2017-7703\", \"CVE-2017-9345\", \"CVE-2017-9347\", \"CVE-2017-9349\", \"CVE-2017-9352\", \"CVE-2018-14340\", \"CVE-2018-14341\", \"CVE-2018-16057\", \"CVE-2018-19622\", \"CVE-2018-5336\", \"CVE-2018-7418\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 15:31:18 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 12:54:39 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for wireshark (EulerOS-SA-2019-2425)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP2\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-2425\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2425\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'wireshark' package(s) announced via the EulerOS-SA-2019-2425 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.(CVE-2018-14340)\n\nIn Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.(CVE-2018-14341)\n\nIn Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB dissectors could crash. This was addressed in epan/tvbparse.c by limiting the recursion depth.(CVE-2018-5336)\n\nIn Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by correcting the extraction of the length value.(CVE-2018-7418)\n\nIn Wireshark 2.2.0 to 2.2.6, the ROS dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/asn1/ros/packet-ros-template.c by validating an OID.(CVE-2017-9347)\n\nIn Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an infinite loop. This was addressed in epan/dissectors/packet-dcm.c by validating a length value.(CVE-2017-9349)\n\nIn Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.(CVE-2018-14340)\n\nIn Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.(CVE-2018-14341)\n\nIn Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the MMSE dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-mmse.c by preventing length overflows.(CVE-2018-19622)\n\nThe dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.(CVE-2015-8714)\n\nIn Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the IrCOMM dissector has a buffer over-read and application crash. This was addressed in plugins/irda/packet-ircomm.c by adding length validation.(CVE-2017-13765)\n\nIn Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the NetBIOS dissector could crash. This was addressed in epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'wireshark' package(s) on Huawei EulerOS V2.0SP2.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP2\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"wireshark\", rpm:\"wireshark~1.10.14~7.h12\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"wireshark-gnome\", rpm:\"wireshark-gnome~1.10.14~7.h12\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "naslFamily": "Huawei EulerOS Local Security Checks"}
{"nessus": [{"lastseen": "2023-01-12T15:31:36", "description": "According to the versions of the wireshark packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - Wireshark is a network traffic analyzer for Unix-ish operating systems.This package lays base for libpcap, a packet capture and filtering library, contains command-line utilities, contains plugins and documentation for wireshark. A graphical user interface is packaged separately to GTK+ package.Security Fix(es):In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.(CVE-2018-14340)In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.(CVE-2018-14341)In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB dissectors could crash. This was addressed in epan/tvbparse.c by limiting the recursion depth.(CVE-2018-5336)In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by correcting the extraction of the length value.(CVE-2018-7418)In Wireshark 2.2.0 to 2.2.6, the ROS dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/asn1/ros/packet-ros-template.c by validating an OID.(CVE-2017-9347)In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an infinite loop. This was addressed in epan/dissectors/packet-dcm.c by validating a length value.(CVE-2017-9349)In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the MMSE dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-mmse.c by preventing length overflows.(CVE-2018-19622)The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.(CVE-2015-8714)In Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the IrCOMM dissector has a buffer over-read and application crash. This was addressed in plugins/irda/packet-ircomm.c by adding length validation.(CVE-2017-13765)In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the NetBIOS dissector could crash. This was addressed in epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning of a buffer.(CVE-2017-17083)The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.(CVE-2015-8712)epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.(CVE-2015-8713)In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the IMAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-imap.c by calculating a line's end correctly.(CVE-2017-7703)In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DNS dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dns.c by trying to detect self-referencing pointers.(CVE-2017-9345)In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bazaar dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by ensuring that backwards parsing cannot occur.(CVE-2017-9352)In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Radiotap dissector could crash. This was addressed in epan/dissectors/packet-ieee80211-radiotap-iter.c by validating iterator operations.(CVE-2018-16057)epan/dissectors/packet-catap ult-dct2000.c in the Catapult DCT2000 dissector in Wireshark 2.x before 2.0.6 does not restrict the number of channels, which allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.(CVE-2016-7177)Stack-based buffer overflow in epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark 2.x before 2.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted packet.(CVE-2016-7179)In Wireshark 2.2.0, the NCP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/CMakeLists.txt by registering this dissector.(CVE-2016-7958)In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the DTN dissector could go into an infinite loop, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dtn.c by checking whether SDNV evaluation was successful.(CVE-2016-9375)epan/dissectors/packet-wbxml.\n c in the WBXML dissector in Wireshark 1.12.x before 1.12.12 mishandles offsets, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted packet.(CVE-2016-5359)epan/dissectors/packet-packetbb.c in the PacketBB dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted packet.(CVE-2016-6505)epan/dissectors/packet-mmse.c in the MMSE dissector in Wireshark 1.12.x before 1.12.13 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.(CVE-2016-6507)epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (large loop) via a crafted packet.(CVE-2016-6508)Off-by-one error in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.(CVE-2016-6510)epan/dissectors/packet-iax2.c in the IAX2 dissector in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.(CVE-2016-4081)Stack-based buffer overflow in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.12.x before 1.12.11 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long string in a packet.(CVE-2016-4085)epan/dissectors/packet-dcerpc-spo olss.c in the SPOOLS component in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles unexpected offsets, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.(CVE-2016-5350)epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the reserved C/T value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.(CVE-2016-5353)Off-by-one error in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that triggers a 0xff tag value, a different vulnerability than CVE-2016-2530.(CVE-2016-2531)The dissect_llrp_parameters function in epan/dissectors/packet-llrp.c in the LLRP dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 does not limit the recursion depth, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.(CVE-2016-2532)epan/proto.c in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not limit the protocol-tree depth, which allows remote attackers to cause a denial of service (stack memory consumption and application crash) via a crafted packet.(CVE-2016-4006)epan/reassemble.c in TShark in Wireshark 2.0.x before 2.0.3 relies on incorrect special-case handling of truncated Tvb data structures, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.(CVE-2016-4077)The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.(CVE-2015-8723)The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.(CVE-2015-8729)The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.(CVE-2015-8731)The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 mishandles the case of an unrecognized TLV type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet, a different vulnerability than CVE-2016-2531.(CVE-2016-2530)The dnp3_al_process_object function in epan/dissectors/packet-dnp.c in the DNP3 dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.(CVE-2016-2523)The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.(CVE-2015-8716)The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.(CVE-2015-8717)Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets for async NLM' option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.(CVE-2015-8718)The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.(CVE-2015-8719)Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.(CVE-2015-8721)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2019-12-04T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP2 : wireshark (EulerOS-SA-2019-2425)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-8712", "CVE-2015-8713", "CVE-2015-8714", "CVE-2015-8716", "CVE-2015-8717", "CVE-2015-8718", "CVE-2015-8719", "CVE-2015-8721", "CVE-2015-8723", "CVE-2015-8729", "CVE-2015-8731", "CVE-2016-2523", "CVE-2016-2530", "CVE-2016-2531", "CVE-2016-2532", "CVE-2016-4006", "CVE-2016-4077", "CVE-2016-4081", "CVE-2016-4085", "CVE-2016-5350", "CVE-2016-5353", "CVE-2016-5359", "CVE-2016-6505", "CVE-2016-6507", "CVE-2016-6508", "CVE-2016-6510", "CVE-2016-7177", "CVE-2016-7179", "CVE-2016-7958", "CVE-2016-9375", "CVE-2017-13765", "CVE-2017-17083", "CVE-2017-7703", "CVE-2017-9345", "CVE-2017-9347", "CVE-2017-9349", "CVE-2017-9352", "CVE-2018-14340", "CVE-2018-14341", "CVE-2018-16057", "CVE-2018-19622", "CVE-2018-5336", "CVE-2018-7418"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:wireshark", "p-cpe:/a:huawei:euleros:wireshark-gnome", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2019-2425.NASL", "href": "https://www.tenable.com/plugins/nessus/131579", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(131579);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2015-8712\",\n \"CVE-2015-8713\",\n \"CVE-2015-8714\",\n \"CVE-2015-8716\",\n \"CVE-2015-8717\",\n \"CVE-2015-8718\",\n \"CVE-2015-8719\",\n \"CVE-2015-8721\",\n \"CVE-2015-8723\",\n \"CVE-2015-8729\",\n \"CVE-2015-8731\",\n \"CVE-2016-2523\",\n \"CVE-2016-2530\",\n \"CVE-2016-2531\",\n \"CVE-2016-2532\",\n \"CVE-2016-4006\",\n \"CVE-2016-4077\",\n \"CVE-2016-4081\",\n \"CVE-2016-4085\",\n \"CVE-2016-5350\",\n \"CVE-2016-5353\",\n \"CVE-2016-5359\",\n \"CVE-2016-6505\",\n \"CVE-2016-6507\",\n \"CVE-2016-6508\",\n \"CVE-2016-6510\",\n \"CVE-2016-7177\",\n \"CVE-2016-7179\",\n \"CVE-2016-7958\",\n \"CVE-2016-9375\",\n \"CVE-2017-13765\",\n \"CVE-2017-17083\",\n \"CVE-2017-7703\",\n \"CVE-2017-9345\",\n \"CVE-2017-9347\",\n \"CVE-2017-9349\",\n \"CVE-2017-9352\",\n \"CVE-2018-14340\",\n \"CVE-2018-14341\",\n \"CVE-2018-16057\",\n \"CVE-2018-19622\",\n \"CVE-2018-5336\",\n \"CVE-2018-7418\"\n );\n\n script_name(english:\"EulerOS 2.0 SP2 : wireshark (EulerOS-SA-2019-2425)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the wireshark packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - Wireshark is a network traffic analyzer for Unix-ish\n operating systems.This package lays base for libpcap, a\n packet capture and filtering library, contains\n command-line utilities, contains plugins and\n documentation for wireshark. A graphical user interface\n is packaged separately to GTK+ package.Security\n Fix(es):In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7,\n and 2.2.0 to 2.2.15, dissectors that support zlib\n decompression could crash. This was addressed in\n epan/tvbuff_zlib.c by rejecting negative lengths to\n avoid a buffer over-read.(CVE-2018-14340)In Wireshark\n 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15,\n the DICOM dissector could go into a large or infinite\n loop. This was addressed in\n epan/dissectors/packet-dcm.c by preventing an offset\n overflow.(CVE-2018-14341)In Wireshark 2.4.0 to 2.4.3\n and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB\n dissectors could crash. This was addressed in\n epan/tvbparse.c by limiting the recursion\n depth.(CVE-2018-5336)In Wireshark 2.2.0 to 2.2.12 and\n 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This\n was addressed in epan/dissectors/packet-sigcomp.c by\n correcting the extraction of the length\n value.(CVE-2018-7418)In Wireshark 2.2.0 to 2.2.6, the\n ROS dissector could crash with a NULL pointer\n dereference. This was addressed in\n epan/dissectors/asn1/ros/packet-ros-template.c by\n validating an OID.(CVE-2017-9347)In Wireshark 2.2.0 to\n 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an\n infinite loop. This was addressed in\n epan/dissectors/packet-dcm.c by validating a length\n value.(CVE-2017-9349)In Wireshark 2.6.0 to 2.6.4 and\n 2.4.0 to 2.4.10, the MMSE dissector could go into an\n infinite loop. This was addressed in\n epan/dissectors/packet-mmse.c by preventing length\n overflows.(CVE-2018-19622)The dissect_dcom_OBJREF\n function in epan/dissectors/packet-dcom.c in the DCOM\n dissector in Wireshark 1.12.x before 1.12.9 does not\n initialize a certain IPv4 data structure, which allows\n remote attackers to cause a denial of service\n (application crash) via a crafted\n packet.(CVE-2015-8714)In Wireshark 2.4.0, 2.2.0 to\n 2.2.8, and 2.0.0 to 2.0.14, the IrCOMM dissector has a\n buffer over-read and application crash. This was\n addressed in plugins/irda/packet-ircomm.c by adding\n length validation.(CVE-2017-13765)In Wireshark 2.4.0 to\n 2.4.2 and 2.2.0 to 2.2.10, the NetBIOS dissector could\n crash. This was addressed in\n epan/dissectors/packet-netbios.c by ensuring that write\n operations are bounded by the beginning of a\n buffer.(CVE-2017-17083)The dissect_hsdsch_channel_info\n function in epan/dissectors/packet-umts_fp.c in the\n UMTS FP dissector in Wireshark 1.12.x before 1.12.9\n does not validate the number of PDUs, which allows\n remote attackers to cause a denial of service\n (application crash) via a crafted\n packet.(CVE-2015-8712)epan/dissectors/packet-umts_fp.c\n in the UMTS FP dissector in Wireshark 1.12.x before\n 1.12.9 does not properly reserve memory for channel ID\n mappings, which allows remote attackers to cause a\n denial of service (out-of-bounds memory access and\n application crash) via a crafted\n packet.(CVE-2015-8713)In Wireshark 2.2.0 to 2.2.5 and\n 2.0.0 to 2.0.11, the IMAP dissector could crash,\n triggered by packet injection or a malformed capture\n file. This was addressed in\n epan/dissectors/packet-imap.c by calculating a line's\n end correctly.(CVE-2017-7703)In Wireshark 2.2.0 to\n 2.2.6 and 2.0.0 to 2.0.12, the DNS dissector could go\n into an infinite loop. This was addressed in\n epan/dissectors/packet-dns.c by trying to detect\n self-referencing pointers.(CVE-2017-9345)In Wireshark\n 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bazaar\n dissector could go into an infinite loop. This was\n addressed in epan/dissectors/packet-bzr.c by ensuring\n that backwards parsing cannot occur.(CVE-2017-9352)In\n Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to\n 2.2.16, the Radiotap dissector could crash. This was\n addressed in\n epan/dissectors/packet-ieee80211-radiotap-iter.c by\n validating iterator\n operations.(CVE-2018-16057)epan/dissectors/packet-catap\n ult-dct2000.c in the Catapult DCT2000 dissector in\n Wireshark 2.x before 2.0.6 does not restrict the number\n of channels, which allows remote attackers to cause a\n denial of service (buffer over-read and application\n crash) via a crafted packet.(CVE-2016-7177)Stack-based\n buffer overflow in\n epan/dissectors/packet-catapult-dct2000.c in the\n Catapult DCT2000 dissector in Wireshark 2.x before\n 2.0.6 allows remote attackers to cause a denial of\n service (application crash) via a crafted\n packet.(CVE-2016-7179)In Wireshark 2.2.0, the NCP\n dissector could crash, triggered by packet injection or\n a malformed capture file. This was addressed in\n epan/dissectors/CMakeLists.txt by registering this\n dissector.(CVE-2016-7958)In Wireshark 2.2.0 to 2.2.1\n and 2.0.0 to 2.0.7, the DTN dissector could go into an\n infinite loop, triggered by network traffic or a\n capture file. This was addressed in\n epan/dissectors/packet-dtn.c by checking whether SDNV\n evaluation was\n successful.(CVE-2016-9375)epan/dissectors/packet-wbxml.\n c in the WBXML dissector in Wireshark 1.12.x before\n 1.12.12 mishandles offsets, which allows remote\n attackers to cause a denial of service (integer\n overflow and infinite loop) via a crafted\n packet.(CVE-2016-5359)epan/dissectors/packet-packetbb.c\n in the PacketBB dissector in Wireshark 1.12.x before\n 1.12.13 and 2.x before 2.0.5 allows remote attackers to\n cause a denial of service (divide-by-zero error and\n application crash) via a crafted\n packet.(CVE-2016-6505)epan/dissectors/packet-mmse.c in\n the MMSE dissector in Wireshark 1.12.x before 1.12.13\n allows remote attackers to cause a denial of service\n (infinite loop) via a crafted\n packet.(CVE-2016-6507)epan/dissectors/packet-rlc.c in\n the RLC dissector in Wireshark 1.12.x before 1.12.13\n and 2.x before 2.0.5 uses an incorrect integer data\n type, which allows remote attackers to cause a denial\n of service (large loop) via a crafted\n packet.(CVE-2016-6508)Off-by-one error in\n epan/dissectors/packet-rlc.c in the RLC dissector in\n Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5\n allows remote attackers to cause a denial of service\n (stack-based buffer overflow and application crash) via\n a crafted\n packet.(CVE-2016-6510)epan/dissectors/packet-iax2.c in\n the IAX2 dissector in Wireshark 1.12.x before 1.12.11\n and 2.0.x before 2.0.3 uses an incorrect integer data\n type, which allows remote attackers to cause a denial\n of service (infinite loop) via a crafted\n packet.(CVE-2016-4081)Stack-based buffer overflow in\n epan/dissectors/packet-ncp2222.inc in the NCP dissector\n in Wireshark 1.12.x before 1.12.11 allows remote\n attackers to cause a denial of service (application\n crash) or possibly have unspecified other impact via a\n long string in a\n packet.(CVE-2016-4085)epan/dissectors/packet-dcerpc-spo\n olss.c in the SPOOLS component in Wireshark 1.12.x\n before 1.12.12 and 2.x before 2.0.4 mishandles\n unexpected offsets, which allows remote attackers to\n cause a denial of service (infinite loop) via a crafted\n packet.(CVE-2016-5350)epan/dissectors/packet-umts_fp.c\n in the UMTS FP dissector in Wireshark 1.12.x before\n 1.12.12 and 2.x before 2.0.4 mishandles the reserved\n C/T value, which allows remote attackers to cause a\n denial of service (application crash) via a crafted\n packet.(CVE-2016-5353)Off-by-one error in\n epan/dissectors/packet-rsl.c in the RSL dissector in\n Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2\n allows remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted packet that triggers a 0xff tag value, a\n different vulnerability than\n CVE-2016-2530.(CVE-2016-2531)The\n dissect_llrp_parameters function in\n epan/dissectors/packet-llrp.c in the LLRP dissector in\n Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2\n does not limit the recursion depth, which allows remote\n attackers to cause a denial of service (memory\n consumption or application crash) via a crafted\n packet.(CVE-2016-2532)epan/proto.c in Wireshark 1.12.x\n before 1.12.11 and 2.0.x before 2.0.3 does not limit\n the protocol-tree depth, which allows remote attackers\n to cause a denial of service (stack memory consumption\n and application crash) via a crafted\n packet.(CVE-2016-4006)epan/reassemble.c in TShark in\n Wireshark 2.0.x before 2.0.3 relies on incorrect\n special-case handling of truncated Tvb data structures,\n which allows remote attackers to cause a denial of\n service (use-after-free and application crash) via a\n crafted packet.(CVE-2016-4077)The AirPDcapPacketProcess\n function in epan/crypt/airpdcap.c in the 802.11\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not validate the relationship between\n the total length and the capture length, which allows\n remote attackers to cause a denial of service\n (stack-based buffer overflow and application crash) via\n a crafted packet.(CVE-2015-8723)The ascend_seek\n function in wiretap/ascendtext.c in the Ascend file\n parser in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not ensure the presence of a '\\0'\n character at the end of a date string, which allows\n remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted file.(CVE-2015-8729)The dissct_rsl_ipaccess_msg\n function in epan/dissectors/packet-rsl.c in the RSL\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not reject unknown TLV types, which\n allows remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted packet.(CVE-2015-8731)The\n dissct_rsl_ipaccess_msg function in\n epan/dissectors/packet-rsl.c in the RSL dissector in\n Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2\n mishandles the case of an unrecognized TLV type, which\n allows remote attackers to cause a denial of service\n (out-of-bounds read and application crash) via a\n crafted packet, a different vulnerability than\n CVE-2016-2531.(CVE-2016-2530)The dnp3_al_process_object\n function in epan/dissectors/packet-dnp.c in the DNP3\n dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x\n before 2.0.2 allows remote attackers to cause a denial\n of service (infinite loop) via a crafted\n packet.(CVE-2016-2523)The init_t38_info_conv function\n in epan/dissectors/packet-t38.c in the T.38 dissector\n in Wireshark 1.12.x before 1.12.9 does not ensure that\n a conversation exists, which allows remote attackers to\n cause a denial of service (application crash) via a\n crafted packet.(CVE-2015-8716)The dissect_sdp function\n in epan/dissectors/packet-sdp.c in the SDP dissector in\n Wireshark 1.12.x before 1.12.9 does not prevent use of\n a negative media count, which allows remote attackers\n to cause a denial of service (application crash) via a\n crafted packet.(CVE-2015-8717)Double free vulnerability\n in epan/dissectors/packet-nlm.c in the NLM dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1,\n when the 'Match MSG/RES packets for async NLM' option\n is enabled, allows remote attackers to cause a denial\n of service (application crash) via a crafted\n packet.(CVE-2015-8718)The dissect_dns_answer function\n in epan/dissectors/packet-dns.c in the DNS dissector in\n Wireshark 1.12.x before 1.12.9 mishandles the EDNS0\n Client Subnet option, which allows remote attackers to\n cause a denial of service (application crash) via a\n crafted packet.(CVE-2015-8719)Buffer overflow in the\n tvb_uncompress function in epan/tvbuff_zlib.c in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n allows remote attackers to cause a denial of service\n (application crash) via a crafted packet with zlib\n compression.(CVE-2015-8721)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2425\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?53098281\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected wireshark packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/04\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:wireshark-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(2)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"wireshark-1.10.14-7.h12\",\n \"wireshark-gnome-1.10.14-7.h12\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"2\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-01-11T16:38:22", "description": "This update to Wireshark 1 12.11 fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file.\n\n - The PKTC dissector could crash (wnpa-sec-2016-22)\n\n - The PKTC dissector could crash (wnpa-sec-2016-23)\n\n - The IAX2 dissector could go into an infinite loop (wnpa-sec-2016-24)\n\n - Wireshark and TShark could exhaust the stack (wnpa-sec-2016-25)\n\n - The GSM CBCH dissector could crash (wnpa-sec-2016-26)\n\n - The NCP dissector could crash (wnpa-sec-2016-28)\n\n - CVE-2016-2523: DNP dissector infinite loop (wnpa-sec-2016-03)\n\n - CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10)\n\n - CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10)\n\n - CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11)\n\n - GSM A-bis OML dissector crash (wnpa-sec-2016-14)\n\n - ASN.1 BER dissector crash (wnpa-sec-2016-15)\n\n - ASN.1 BER dissector crash (wnpa-sec-2016-18)\n\nAlso containsfurther bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html https://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-05-19T00:00:00", "type": "nessus", "title": "SUSE SLES11 Security Update : wireshark (SUSE-SU-2016:1345-1)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-2523", "CVE-2016-2530", "CVE-2016-2531", "CVE-2016-2532"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:wireshark", "cpe:/o:novell:suse_linux:11"], "id": "SUSE_SU-2016-1345-1.NASL", "href": "https://www.tenable.com/plugins/nessus/91252", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2016:1345-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(91252);\n script_version(\"2.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2016-2523\", \"CVE-2016-2530\", \"CVE-2016-2531\", \"CVE-2016-2532\");\n\n script_name(english:\"SUSE SLES11 Security Update : wireshark (SUSE-SU-2016:1345-1)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update to Wireshark 1 12.11 fixes a number issues in protocol\ndissectors that could have allowed a remote attacker to crash\nWireshark or cause excessive CPU usage through specially crafted\npackages inserted into the network or a capture file.\n\n - The PKTC dissector could crash (wnpa-sec-2016-22)\n\n - The PKTC dissector could crash (wnpa-sec-2016-23)\n\n - The IAX2 dissector could go into an infinite loop\n (wnpa-sec-2016-24)\n\n - Wireshark and TShark could exhaust the stack\n (wnpa-sec-2016-25)\n\n - The GSM CBCH dissector could crash (wnpa-sec-2016-26)\n\n - The NCP dissector could crash (wnpa-sec-2016-28)\n\n - CVE-2016-2523: DNP dissector infinite loop\n (wnpa-sec-2016-03)\n\n - CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10)\n\n - CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10)\n\n - CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11)\n\n - GSM A-bis OML dissector crash (wnpa-sec-2016-14)\n\n - ASN.1 BER dissector crash (wnpa-sec-2016-15)\n\n - ASN.1 BER dissector crash (wnpa-sec-2016-18)\n\nAlso containsfurther bug fixes and updated protocol support as listed\nin: https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html\nhttps://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968565\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=976944\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2523/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2530/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2531/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2532/\"\n );\n # https://www.suse.com/support/update/announcement/2016/suse-su-20161345-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4b3869bb\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 11-SP4 :\n\nzypper in -t patch sdksp4-wireshark-12565=1\n\nSUSE Linux Enterprise Server 11-SP4 :\n\nzypper in -t patch slessp4-wireshark-12565=1\n\nSUSE Linux Enterprise Debuginfo 11-SP4 :\n\nzypper in -t patch dbgsp4-wireshark-12565=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/02/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/05/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/05/19\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES11)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES11\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES11\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES11 SP4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"wireshark-1.12.11-0.18.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark\");\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-01-11T16:37:35", "description": "This update to Wireshark 1 12.11 fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file.\n\n - The PKTC dissector could crash (wnpa-sec-2016-22)\n\n - The PKTC dissector could crash (wnpa-sec-2016-23)\n\n - The IAX2 dissector could go into an infinite loop (wnpa-sec-2016-24)\n\n - Wireshark and TShark could exhaust the stack (wnpa-sec-2016-25)\n\n - The GSM CBCH dissector could crash (wnpa-sec-2016-26)\n\n - The NCP dissector could crash (wnpa-sec-2016-28)\n\n - CVE-2016-2523: DNP dissector infinite loop (wnpa-sec-2016-03)\n\n - CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10)\n\n - CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10)\n\n - CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11)\n\n - GSM A-bis OML dissector crash (wnpa-sec-2016-14)\n\n - ASN.1 BER dissector crash (wnpa-sec-2016-15)\n\n - ASN.1 BER dissector crash (wnpa-sec-2016-18)\n\nAlso containsfurther bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html https://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-05-19T00:00:00", "type": "nessus", "title": "SUSE SLED12 / SLES12 Security Update : wireshark (SUSE-SU-2016:1344-1)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-2523", "CVE-2016-2530", "CVE-2016-2531", "CVE-2016-2532"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:wireshark", "p-cpe:/a:novell:suse_linux:wireshark-debuginfo", "p-cpe:/a:novell:suse_linux:wireshark-debugsource", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2016-1344-1.NASL", "href": "https://www.tenable.com/plugins/nessus/91251", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2016:1344-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(91251);\n script_version(\"2.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2016-2523\", \"CVE-2016-2530\", \"CVE-2016-2531\", \"CVE-2016-2532\");\n\n script_name(english:\"SUSE SLED12 / SLES12 Security Update : wireshark (SUSE-SU-2016:1344-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update to Wireshark 1 12.11 fixes a number issues in protocol\ndissectors that could have allowed a remote attacker to crash\nWireshark or cause excessive CPU usage through specially crafted\npackages inserted into the network or a capture file.\n\n - The PKTC dissector could crash (wnpa-sec-2016-22)\n\n - The PKTC dissector could crash (wnpa-sec-2016-23)\n\n - The IAX2 dissector could go into an infinite loop\n (wnpa-sec-2016-24)\n\n - Wireshark and TShark could exhaust the stack\n (wnpa-sec-2016-25)\n\n - The GSM CBCH dissector could crash (wnpa-sec-2016-26)\n\n - The NCP dissector could crash (wnpa-sec-2016-28)\n\n - CVE-2016-2523: DNP dissector infinite loop\n (wnpa-sec-2016-03)\n\n - CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10)\n\n - CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10)\n\n - CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11)\n\n - GSM A-bis OML dissector crash (wnpa-sec-2016-14)\n\n - ASN.1 BER dissector crash (wnpa-sec-2016-15)\n\n - ASN.1 BER dissector crash (wnpa-sec-2016-18)\n\nAlso containsfurther bug fixes and updated protocol support as listed\nin: https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html\nhttps://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968565\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=976944\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2523/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2530/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2531/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2532/\"\n );\n # https://www.suse.com/support/update/announcement/2016/suse-su-20161344-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?83c5ba7b\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 12-SP1 :\n\nzypper in -t patch SUSE-SLE-SDK-12-SP1-2016-788=1\n\nSUSE Linux Enterprise Software Development Kit 12 :\n\nzypper in -t patch SUSE-SLE-SDK-12-2016-788=1\n\nSUSE Linux Enterprise Server 12-SP1 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-788=1\n\nSUSE Linux Enterprise Server 12 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-2016-788=1\n\nSUSE Linux Enterprise Desktop 12-SP1 :\n\nzypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-788=1\n\nSUSE Linux Enterprise Desktop 12 :\n\nzypper in -t patch SUSE-SLE-DESKTOP-12-2016-788=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/02/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/05/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/05/19\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED12|SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED12 / SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(0|1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP0/1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED12\" && (! preg(pattern:\"^(0|1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED12 SP0/1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"wireshark-1.12.11-25.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"wireshark-debuginfo-1.12.11-25.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"wireshark-debugsource-1.12.11-25.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", reference:\"wireshark-1.12.11-25.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", reference:\"wireshark-debuginfo-1.12.11-25.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", reference:\"wireshark-debugsource-1.12.11-25.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"wireshark-1.12.11-25.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"wireshark-debuginfo-1.12.11-25.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"wireshark-debugsource-1.12.11-25.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"wireshark-1.12.11-25.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"wireshark-debuginfo-1.12.11-25.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"wireshark-debugsource-1.12.11-25.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark\");\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-01-11T16:34:30", "description": "Wireshark was updated to 1.12.10, fixing a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file, specifically :\n\n - CVE-2016-2523: DNP dissector infinite loop (wnpa-sec-2016-03)\n\n - CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10)\n\n - CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10)\n\n - CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11)\n\n - GSM A-bis OML dissector crash (wnpa-sec-2016-14)\n\n - ASN.1 BER dissector crash (wnpa-sec-2016-15)\n\n - ASN.1 BER dissector crash (wnpa-sec-2016-18)\n\nFurther bug fixes and updated protocol support as listed in:\nhttps://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html\n\nThe following non-security bugs were fixed :\n\n - boo#961170: Recommend wireshark-ui instead of requiring it to support text-only used", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-03-07T00:00:00", "type": "nessus", "title": "openSUSE Security Update : wireshark (openSUSE-2016-302)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-2523", "CVE-2016-2530", "CVE-2016-2531", "CVE-2016-2532"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:wireshark", "p-cpe:/a:novell:opensuse:wireshark-debuginfo", "p-cpe:/a:novell:opensuse:wireshark-debugsource", "p-cpe:/a:novell:opensuse:wireshark-devel", "p-cpe:/a:novell:opensuse:wireshark-ui-gtk", "p-cpe:/a:novell:opensuse:wireshark-ui-gtk-debuginfo", "p-cpe:/a:novell:opensuse:wireshark-ui-qt", "p-cpe:/a:novell:opensuse:wireshark-ui-qt-debuginfo", "cpe:/o:novell:opensuse:13.1"], "id": "OPENSUSE-2016-302.NASL", "href": "https://www.tenable.com/plugins/nessus/89716", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2016-302.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(89716);\n script_version(\"2.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2016-2523\", \"CVE-2016-2530\", \"CVE-2016-2531\", \"CVE-2016-2532\");\n\n script_name(english:\"openSUSE Security Update : wireshark (openSUSE-2016-302)\");\n script_summary(english:\"Check for the openSUSE-2016-302 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Wireshark was updated to 1.12.10, fixing a number issues in protocol\ndissectors that could have allowed a remote attacker to crash\nWireshark or cause excessive CPU usage through specially crafted\npackages inserted into the network or a capture file, specifically :\n\n - CVE-2016-2523: DNP dissector infinite loop\n (wnpa-sec-2016-03)\n\n - CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10)\n\n - CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10)\n\n - CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11)\n\n - GSM A-bis OML dissector crash (wnpa-sec-2016-14)\n\n - ASN.1 BER dissector crash (wnpa-sec-2016-15)\n\n - ASN.1 BER dissector crash (wnpa-sec-2016-18)\n\nFurther bug fixes and updated protocol support as listed in:\nhttps://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html\n\nThe following non-security bugs were fixed :\n\n - boo#961170: Recommend wireshark-ui instead of requiring\n it to support text-only used\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=961170\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968565\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected wireshark packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-gtk-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-qt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/03/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/03/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"wireshark-1.12.10-50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"wireshark-debuginfo-1.12.10-50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"wireshark-debugsource-1.12.10-50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"wireshark-devel-1.12.10-50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"wireshark-ui-gtk-1.12.10-50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"wireshark-ui-gtk-debuginfo-1.12.10-50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"wireshark-ui-qt-1.12.10-50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"wireshark-ui-qt-debuginfo-1.12.10-50.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark / wireshark-debuginfo / wireshark-debugsource / etc\");\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-01-11T16:34:29", "description": "Wireshark was updated to 1.12.10, fixing a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file, specifically :\n\n - CVE-2016-2523: DNP dissector infinite loop (wnpa-sec-2016-03)\n\n - CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10)\n\n - CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10)\n\n - CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11)\n\n - GSM A-bis OML dissector crash (wnpa-sec-2016-14)\n\n - ASN.1 BER dissector crash (wnpa-sec-2016-15)\n\n - ASN.1 BER dissector crash (wnpa-sec-2016-18)\n\nFurther bug fixes and updated protocol support as listed in:\nhttps://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html\n\nThe following non-security bugs were fixed :\n\n - boo#961170: Recommend wireshark-ui instead of requiring it to support text-only used", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-03-07T00:00:00", "type": "nessus", "title": "openSUSE Security Update : wireshark (openSUSE-2016-301)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-2523", "CVE-2016-2530", "CVE-2016-2531", "CVE-2016-2532"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:wireshark", "p-cpe:/a:novell:opensuse:wireshark-debuginfo", "p-cpe:/a:novell:opensuse:wireshark-debugsource", "p-cpe:/a:novell:opensuse:wireshark-devel", "p-cpe:/a:novell:opensuse:wireshark-ui-gtk", "p-cpe:/a:novell:opensuse:wireshark-ui-gtk-debuginfo", "p-cpe:/a:novell:opensuse:wireshark-ui-qt", "p-cpe:/a:novell:opensuse:wireshark-ui-qt-debuginfo", "cpe:/o:novell:opensuse:13.2", "cpe:/o:novell:opensuse:42.1"], "id": "OPENSUSE-2016-301.NASL", "href": "https://www.tenable.com/plugins/nessus/89715", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2016-301.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(89715);\n script_version(\"2.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2016-2523\", \"CVE-2016-2530\", \"CVE-2016-2531\", \"CVE-2016-2532\");\n\n script_name(english:\"openSUSE Security Update : wireshark (openSUSE-2016-301)\");\n script_summary(english:\"Check for the openSUSE-2016-301 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Wireshark was updated to 1.12.10, fixing a number issues in protocol\ndissectors that could have allowed a remote attacker to crash\nWireshark or cause excessive CPU usage through specially crafted\npackages inserted into the network or a capture file, specifically :\n\n - CVE-2016-2523: DNP dissector infinite loop\n (wnpa-sec-2016-03)\n\n - CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10)\n\n - CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10)\n\n - CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11)\n\n - GSM A-bis OML dissector crash (wnpa-sec-2016-14)\n\n - ASN.1 BER dissector crash (wnpa-sec-2016-15)\n\n - ASN.1 BER dissector crash (wnpa-sec-2016-18)\n\nFurther bug fixes and updated protocol support as listed in:\nhttps://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html\n\nThe following non-security bugs were fixed :\n\n - boo#961170: Recommend wireshark-ui instead of requiring\n it to support text-only used\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=961170\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968565\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected wireshark packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-gtk-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-qt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/03/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/03/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.2|SUSE42\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.2 / 42.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-1.12.10-32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-debuginfo-1.12.10-32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-debugsource-1.12.10-32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-devel-1.12.10-32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-ui-gtk-1.12.10-32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-ui-gtk-debuginfo-1.12.10-32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-ui-qt-1.12.10-32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-ui-qt-debuginfo-1.12.10-32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-1.12.10-17.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-debuginfo-1.12.10-17.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-debugsource-1.12.10-17.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-devel-1.12.10-17.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-ui-gtk-1.12.10-17.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-ui-gtk-debuginfo-1.12.10-17.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-ui-qt-1.12.10-17.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-ui-qt-debuginfo-1.12.10-17.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark / wireshark-debuginfo / wireshark-debugsource / etc\");\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-01-11T16:39:50", "description": "CVE-2015-8711\n\nepan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.\n\nCVE-2015-8714 The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\nCVE-2015-8716 The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\nCVE-2015-8717 The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\nCVE-2015-8718 Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets for async NLM' option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\nCVE-2015-8720 The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\nCVE-2015-8721 Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.\n\nCVE-2015-8723 The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.\n\nCVE-2015-8725 The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.\n\nCVE-2015-8729 The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.\n\nCVE-2015-8730 epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.\n\nCVE-2015-8733 The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.\n\nCVE-2016-2523 The dnp3_al_process_object function in epan/dissectors/packet-dnp.c in the DNP3 dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.\n\nCVE-2016-4006 epan/proto.c in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not limit the protocol-tree depth, which allows remote attackers to cause a denial of service (stack memory consumption and application crash) via a crafted packet.\n\nCVE-2016-4078 The IEEE 802.11 dissector in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not properly restrict element lists, which allows remote attackers to cause a denial of service (deep recursion and application crash) via a crafted packet, related to epan/dissectors/packet-capwap.c and epan/dissectors/packet-ieee80211.c.\n\nCVE-2016-4079 epan/dissectors/packet-pktc.c in the PKTC dissector in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not verify BER identifiers, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) via a crafted packet.\n\nCVE-2016-4080 epan/dissectors/packet-pktc.c in the PKTC dissector in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 misparses timestamp fields, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.\n\nCVE-2016-4081 epan/dissectors/packet-iax2.c in the IAX2 dissector in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.\n\nCVE-2016-4085 Stack-based buffer overflow in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.12.x before 1.12.11 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long string in a packet.\n\nImpact\n\nIf Wireshark is launched manually by a user with Advanced Shell ( bash ) access, dissection of specially crafted packets could cause Wireshark to consume excessive resources. Wireshark is not part of normal BIG-IP operation; only users who actively run Wireshark are vulnerable.", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-06-27T00:00:00", "type": "nessus", "title": "F5 Networks BIG-IP : Multiple Wireshark (tshark) vulnerabilities (K01837042)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-8711", "CVE-2015-8714", "CVE-2015-8716", "CVE-2015-8717", "CVE-2015-8718", "CVE-2015-8720", "CVE-2015-8721", "CVE-2015-8723", "CVE-2015-8725", "CVE-2015-8729", "CVE-2015-8730", "CVE-2015-8733", "CVE-2016-2523", "CVE-2016-4006", "CVE-2016-4078", "CVE-2016-4079", "CVE-2016-4080", "CVE-2016-4081", "CVE-2016-4085"], "modified": "2019-01-04T00:00:00", "cpe": ["cpe:/a:f5:big-ip_access_policy_manager", "cpe:/a:f5:big-ip_advanced_firewall_manager", "cpe:/a:f5:big-ip_application_acceleration_manager", "cpe:/a:f5:big-ip_application_security_manager", "cpe:/a:f5:big-ip_application_visibility_and_reporting", "cpe:/a:f5:big-ip_global_traffic_manager", "cpe:/a:f5:big-ip_link_controller", "cpe:/a:f5:big-ip_local_traffic_manager", "cpe:/a:f5:big-ip_policy_enforcement_manager", "cpe:/h:f5:big-ip", "cpe:/h:f5:big-ip_protocol_security_manager"], "id": "F5_BIGIP_SOL01837042.NASL", "href": "https://www.tenable.com/plugins/nessus/91838", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from F5 Networks BIG-IP Solution K01837042.\n#\n# The text description of this plugin is (C) F5 Networks.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(91838);\n script_version(\"2.10\");\n script_cvs_date(\"Date: 2019/01/04 10:03:40\");\n\n script_cve_id(\"CVE-2015-8711\", \"CVE-2015-8714\", \"CVE-2015-8716\", \"CVE-2015-8717\", \"CVE-2015-8718\", \"CVE-2015-8720\", \"CVE-2015-8721\", \"CVE-2015-8723\", \"CVE-2015-8725\", \"CVE-2015-8729\", \"CVE-2015-8730\", \"CVE-2015-8733\", \"CVE-2016-2523\", \"CVE-2016-4006\", \"CVE-2016-4078\", \"CVE-2016-4079\", \"CVE-2016-4080\", \"CVE-2016-4081\", \"CVE-2016-4085\");\n\n script_name(english:\"F5 Networks BIG-IP : Multiple Wireshark (tshark) vulnerabilities (K01837042)\");\n script_summary(english:\"Checks the BIG-IP version.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote device is missing a vendor-supplied security patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"CVE-2015-8711\n\nepan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark\n1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate\nconversation data, which allows remote attackers to cause a denial of\nservice (NULL pointer dereference and application crash) via a crafted\npacket.\n\nCVE-2015-8714 The dissect_dcom_OBJREF function in\nepan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark\n1.12.x before 1.12.9 does not initialize a certain IPv4 data\nstructure, which allows remote attackers to cause a denial of service\n(application crash) via a crafted packet.\n\nCVE-2015-8716 The init_t38_info_conv function in\nepan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x\nbefore 1.12.9 does not ensure that a conversation exists, which allows\nremote attackers to cause a denial of service (application crash) via\na crafted packet.\n\nCVE-2015-8717 The dissect_sdp function in epan/dissectors/packet-sdp.c\nin the SDP dissector in Wireshark 1.12.x before 1.12.9 does not\nprevent use of a negative media count, which allows remote attackers\nto cause a denial of service (application crash) via a crafted packet.\n\nCVE-2015-8718 Double free vulnerability in\nepan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x\nbefore 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets\nfor async NLM' option is enabled, allows remote attackers to cause a\ndenial of service (application crash) via a crafted packet.\n\nCVE-2015-8720 The dissect_ber_GeneralizedTime function in\nepan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x\nbefore 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf\nreturn value, which allows remote attackers to cause a denial of\nservice (application crash) via a crafted packet.\n\nCVE-2015-8721 Buffer overflow in the tvb_uncompress function in\nepan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before\n2.0.1 allows remote attackers to cause a denial of service\n(application crash) via a crafted packet with zlib compression.\n\nCVE-2015-8723 The AirPDcapPacketProcess function in\nepan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x\nbefore 1.12.9 and 2.0.x before 2.0.1 does not validate the\nrelationship between the total length and the capture length, which\nallows remote attackers to cause a denial of service (stack-based\nbuffer overflow and application crash) via a crafted packet.\n\nCVE-2015-8725 The dissect_diameter_base_framed_ipv6_prefix function in\nepan/dissectors/packet-diameter.c in the DIAMETER dissector in\nWireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not\nvalidate the IPv6 prefix length, which allows remote attackers to\ncause a denial of service (stack-based buffer overflow and application\ncrash) via a crafted packet.\n\nCVE-2015-8729 The ascend_seek function in wiretap/ascendtext.c in the\nAscend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before\n2.0.1 does not ensure the presence of a '\\0' character at the end of a\ndate string, which allows remote attackers to cause a denial of\nservice (out-of-bounds read and application crash) via a crafted file.\n\nCVE-2015-8730 epan/dissectors/packet-nbap.c in the NBAP dissector in\nWireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not\nvalidate the number of items, which allows remote attackers to cause a\ndenial of service (invalid read operation and application crash) via a\ncrafted packet.\n\nCVE-2015-8733 The ngsniffer_process_record function in\nwiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x\nbefore 1.12.9 and 2.0.x before 2.0.1 does not validate the\nrelationships between record lengths and record header lengths, which\nallows remote attackers to cause a denial of service (out-of-bounds\nread and application crash) via a crafted file.\n\nCVE-2016-2523 The dnp3_al_process_object function in\nepan/dissectors/packet-dnp.c in the DNP3 dissector in Wireshark 1.12.x\nbefore 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause\na denial of service (infinite loop) via a crafted packet.\n\nCVE-2016-4006 epan/proto.c in Wireshark 1.12.x before 1.12.11 and\n2.0.x before 2.0.3 does not limit the protocol-tree depth, which\nallows remote attackers to cause a denial of service (stack memory\nconsumption and application crash) via a crafted packet.\n\nCVE-2016-4078 The IEEE 802.11 dissector in Wireshark 1.12.x before\n1.12.11 and 2.0.x before 2.0.3 does not properly restrict element\nlists, which allows remote attackers to cause a denial of service\n(deep recursion and application crash) via a crafted packet, related\nto epan/dissectors/packet-capwap.c and\nepan/dissectors/packet-ieee80211.c.\n\nCVE-2016-4079 epan/dissectors/packet-pktc.c in the PKTC dissector in\nWireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not verify\nBER identifiers, which allows remote attackers to cause a denial of\nservice (out-of-bounds write and application crash) via a crafted\npacket.\n\nCVE-2016-4080 epan/dissectors/packet-pktc.c in the PKTC dissector in\nWireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 misparses\ntimestamp fields, which allows remote attackers to cause a denial of\nservice (out-of-bounds read and application crash) via a crafted\npacket.\n\nCVE-2016-4081 epan/dissectors/packet-iax2.c in the IAX2 dissector in\nWireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 uses an\nincorrect integer data type, which allows remote attackers to cause a\ndenial of service (infinite loop) via a crafted packet.\n\nCVE-2016-4085 Stack-based buffer overflow in\nepan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark\n1.12.x before 1.12.11 allows remote attackers to cause a denial of\nservice (application crash) or possibly have unspecified other impact\nvia a long string in a packet.\n\nImpact\n\nIf Wireshark is launched manually by a user with Advanced Shell ( bash\n) access, dissection of specially crafted packets could cause\nWireshark to consume excessive resources. Wireshark is not part of\nnormal BIG-IP operation; only users who actively run Wireshark are\nvulnerable.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://support.f5.com/csp/article/K01837042\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade to one of the non-vulnerable versions listed in the F5\nSolution K01837042.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_access_policy_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_advanced_firewall_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_application_acceleration_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_application_security_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_application_visibility_and_reporting\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_global_traffic_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_link_controller\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_local_traffic_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_policy_enforcement_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/h:f5:big-ip\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/h:f5:big-ip_protocol_security_manager\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/06/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/06/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"F5 Networks Local Security Checks\");\n\n script_dependencies(\"f5_bigip_detect.nbin\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/BIG-IP/hotfix\", \"Host/BIG-IP/modules\", \"Host/BIG-IP/version\", \"Settings/ParanoidReport\");\n\n exit(0);\n}\n\n\ninclude(\"f5_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nversion = get_kb_item(\"Host/BIG-IP/version\");\nif ( ! version ) audit(AUDIT_OS_NOT, \"F5 Networks BIG-IP\");\nif ( isnull(get_kb_item(\"Host/BIG-IP/hotfix\")) ) audit(AUDIT_KB_MISSING, \"Host/BIG-IP/hotfix\");\nif ( ! get_kb_item(\"Host/BIG-IP/modules\") ) audit(AUDIT_KB_MISSING, \"Host/BIG-IP/modules\");\n\nsol = \"K01837042\";\nvmatrix = make_array();\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\n# AFM\nvmatrix[\"AFM\"] = make_array();\nvmatrix[\"AFM\"][\"affected\" ] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.4.0-11.6.2\");\nvmatrix[\"AFM\"][\"unaffected\"] = make_list(\"13.1.0\",\"12.1.3\");\n\n# AM\nvmatrix[\"AM\"] = make_array();\nvmatrix[\"AM\"][\"affected\" ] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.4.0-11.6.2\");\nvmatrix[\"AM\"][\"unaffected\"] = make_list(\"13.1.0\",\"12.1.3\");\n\n# APM\nvmatrix[\"APM\"] = make_array();\nvmatrix[\"APM\"][\"affected\" ] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.4.0-11.6.2\");\nvmatrix[\"APM\"][\"unaffected\"] = make_list(\"13.1.0\",\"12.1.3\",\"11.2.1\",\"10.2.1-10.2.4\");\n\n# ASM\nvmatrix[\"ASM\"] = make_array();\nvmatrix[\"ASM\"][\"affected\" ] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.4.0-11.6.2\");\nvmatrix[\"ASM\"][\"unaffected\"] = make_list(\"13.1.0\",\"12.1.3\",\"11.2.1\",\"10.2.1-10.2.4\");\n\n# AVR\nvmatrix[\"AVR\"] = make_array();\nvmatrix[\"AVR\"][\"affected\" ] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.4.0-11.6.2\");\nvmatrix[\"AVR\"][\"unaffected\"] = make_list(\"13.1.0\",\"12.1.3\",\"11.2.1\");\n\n# GTM\nvmatrix[\"GTM\"] = make_array();\nvmatrix[\"GTM\"][\"affected\" ] = make_list(\"11.4.0-11.6.2\");\nvmatrix[\"GTM\"][\"unaffected\"] = make_list(\"11.2.1\",\"10.2.1-10.2.4\");\n\n# LC\nvmatrix[\"LC\"] = make_array();\nvmatrix[\"LC\"][\"affected\" ] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.4.0-11.6.2\");\nvmatrix[\"LC\"][\"unaffected\"] = make_list(\"13.1.0\",\"12.1.3\",\"11.2.1\",\"10.2.1-10.2.4\");\n\n# LTM\nvmatrix[\"LTM\"] = make_array();\nvmatrix[\"LTM\"][\"affected\" ] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.4.0-11.6.2\");\nvmatrix[\"LTM\"][\"unaffected\"] = make_list(\"13.1.0\",\"12.1.3\",\"11.2.1\",\"10.2.1-10.2.4\");\n\n# PEM\nvmatrix[\"PEM\"] = make_array();\nvmatrix[\"PEM\"][\"affected\" ] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.4.0-11.6.2\");\nvmatrix[\"PEM\"][\"unaffected\"] = make_list(\"13.1.0\",\"12.1.3\");\n\n# PSM\nvmatrix[\"PSM\"] = make_array();\nvmatrix[\"PSM\"][\"affected\" ] = make_list(\"11.4.0-11.4.1\");\nvmatrix[\"PSM\"][\"unaffected\"] = make_list(\"10.2.1-10.2.4\");\n\n\nif (bigip_is_affected(vmatrix:vmatrix, sol:sol))\n{\n if (report_verbosity > 0) security_hole(port:0, extra:bigip_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = bigip_get_tested_modules();\n audit_extra = \"For BIG-IP module(s) \" + tested + \",\";\n if (tested) audit(AUDIT_INST_VER_NOT_VULN, audit_extra, version);\n else audit(AUDIT_HOST_NOT, \"running any of the affected modules\");\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-01-24T14:23:52", "description": "In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Radiotap dissector could crash. This was addressed in epan/dissectors/packet-ieee80211-radiotap-iter.c by validating iterator operations. (CVE-2018-16057)\n\nIn Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the MMSE dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-mmse.c by preventing length overflows.\n(CVE-2018-19622)\n\nIn Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that are too long. (CVE-2018-14368 )\n\nIn Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read. (CVE-2018-14340)\n\nIn Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow. (CVE-2018-14341)\n\nIn Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by avoiding a buffer over-read upon encountering a missing '\\0' character. (CVE-2018-11362)\n\nIn Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by correcting the extraction of the length value. (CVE-2018-7418)", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-06-18T00:00:00", "type": "nessus", "title": "Amazon Linux 2 : wireshark (ALAS-2020-1438)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-11362", "CVE-2018-14340", "CVE-2018-14341", "CVE-2018-14368", "CVE-2018-16057", "CVE-2018-19622", "CVE-2018-7418"], "modified": "2020-06-22T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:wireshark", "p-cpe:/a:amazon:linux:wireshark-debuginfo", "p-cpe:/a:amazon:linux:wireshark-devel", "p-cpe:/a:amazon:linux:wireshark-gnome", "cpe:/o:amazon:linux:2"], "id": "AL2_ALAS-2020-1438.NASL", "href": "https://www.tenable.com/plugins/nessus/137569", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux 2 Security Advisory ALAS-2020-1438.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(137569);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/06/22\");\n\n script_cve_id(\"CVE-2018-11362\", \"CVE-2018-14340\", \"CVE-2018-14341\", \"CVE-2018-14368\", \"CVE-2018-16057\", \"CVE-2018-19622\", \"CVE-2018-7418\");\n script_xref(name:\"ALAS\", value:\"2020-1438\");\n\n script_name(english:\"Amazon Linux 2 : wireshark (ALAS-2020-1438)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Amazon Linux 2 host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the\nRadiotap dissector could crash. This was addressed in\nepan/dissectors/packet-ieee80211-radiotap-iter.c by validating\niterator operations. (CVE-2018-16057)\n\nIn Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the MMSE dissector\ncould go into an infinite loop. This was addressed in\nepan/dissectors/packet-mmse.c by preventing length overflows.\n(CVE-2018-19622)\n\nIn Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the\nBazaar protocol dissector could go into an infinite loop. This was\naddressed in epan/dissectors/packet-bzr.c by properly handling items\nthat are too long. (CVE-2018-14368 )\n\nIn Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15,\ndissectors that support zlib decompression could crash. This was\naddressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid\na buffer over-read. (CVE-2018-14340)\n\nIn Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the\nDICOM dissector could go into a large or infinite loop. This was\naddressed in epan/dissectors/packet-dcm.c by preventing an offset\noverflow. (CVE-2018-14341)\n\nIn Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LDSS\ndissector could crash. This was addressed in\nepan/dissectors/packet-ldss.c by avoiding a buffer over-read upon\nencountering a missing '\\0' character. (CVE-2018-11362)\n\nIn Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector\ncould crash. This was addressed in epan/dissectors/packet-sigcomp.c by\ncorrecting the extraction of the length value. (CVE-2018-7418)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/AL2/ALAS-2020-1438.html\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Run 'yum update wireshark' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:wireshark-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:wireshark-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:wireshark-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux:2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/06/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/06/18\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"2\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux 2\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"AL2\", reference:\"wireshark-1.10.14-24.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"wireshark-debuginfo-1.10.14-24.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"wireshark-devel-1.10.14-24.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"wireshark-gnome-1.10.14-24.amzn2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark / wireshark-debuginfo / wireshark-devel / wireshark-gnome\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-01-26T14:36:02", "description": "The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:1047 advisory.\n\n - wireshark: Out-of-bounds read in packet-ldss.c (CVE-2018-11362)\n\n - wireshark: Multiple dissectors could crash (wnpa-sec-2018-36) (CVE-2018-14340)\n\n - wireshark: DICOM dissector infinite loop (wnpa-sec-2018-39) (CVE-2018-14341)\n\n - wireshark: Bazaar dissector infinite loop (wnpa-sec-2018-40) (CVE-2018-14368)\n\n - wireshark: Radiotap dissector crash (CVE-2018-16057)\n\n - wireshark: Infinite loop in the MMSE dissector (CVE-2018-19622)\n\n - wireshark: SIGCOMP dissector crash in packet-sigcomp.c (CVE-2018-7418)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-04-01T00:00:00", "type": "nessus", "title": "RHEL 7 : wireshark (RHSA-2020:1047)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-11362", "CVE-2018-14340", "CVE-2018-14341", "CVE-2018-14368", "CVE-2018-16057", "CVE-2018-19622", "CVE-2018-7418"], "modified": "2023-01-23T00:00:00", "cpe": ["cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*", "p-cpe:2.3:a:redhat:enterprise_linux:wireshark:*:*:*:*:*:*:*", "p-cpe:2.3:a:redhat:enterprise_linux:wireshark-gnome:*:*:*:*:*:*:*", "p-cpe:2.3:a:redhat:enterprise_linux:wireshark-devel:*:*:*:*:*:*:*"], "id": "REDHAT-RHSA-2020-1047.NASL", "href": "https://www.tenable.com/plugins/nessus/135076", "sourceData": "##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:1047. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(135076);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/01/23\");\n\n script_cve_id(\n \"CVE-2018-7418\",\n \"CVE-2018-11362\",\n \"CVE-2018-14340\",\n \"CVE-2018-14341\",\n \"CVE-2018-14368\",\n \"CVE-2018-16057\",\n \"CVE-2018-19622\"\n );\n script_bugtraq_id(\n 103157,\n 104308,\n 104847,\n 105174,\n 106051\n );\n script_xref(name:\"RHSA\", value:\"2020:1047\");\n script_xref(name:\"IAVB\", value:\"2018-B-0032-S\");\n script_xref(name:\"IAVB\", value:\"2018-B-0072-S\");\n script_xref(name:\"IAVB\", value:\"2018-B-0093-S\");\n script_xref(name:\"IAVB\", value:\"2018-B-0120-S\");\n script_xref(name:\"IAVB\", value:\"2018-B-0154-S\");\n\n script_name(english:\"RHEL 7 : wireshark (RHSA-2020:1047)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as\nreferenced in the RHSA-2020:1047 advisory.\n\n - wireshark: Out-of-bounds read in packet-ldss.c (CVE-2018-11362)\n\n - wireshark: Multiple dissectors could crash (wnpa-sec-2018-36) (CVE-2018-14340)\n\n - wireshark: DICOM dissector infinite loop (wnpa-sec-2018-39) (CVE-2018-14341)\n\n - wireshark: Bazaar dissector infinite loop (wnpa-sec-2018-40) (CVE-2018-14368)\n\n - wireshark: Radiotap dissector crash (CVE-2018-16057)\n\n - wireshark: Infinite loop in the MMSE dissector (CVE-2018-19622)\n\n - wireshark: SIGCOMP dissector crash in packet-sigcomp.c (CVE-2018-7418)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2018-7418\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2018-11362\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2018-14340\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2018-14341\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2018-14368\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2018-16057\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2018-19622\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2020:1047\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1549305\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1581787\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1607323\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1607326\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1607327\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1625925\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1655932\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected wireshark, wireshark-devel and / or wireshark-gnome packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-14368\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 125, 400, 835);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/03/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/04/01\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:wireshark-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:wireshark-gnome\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"redhat_repos.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\ninclude('rhel.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/RedHat/release');\nif (isnull(os_release) || 'Red Hat' >!< os_release) audit(AUDIT_OS_NOT, 'Red Hat');\nvar os_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '7')) audit(AUDIT_OS_NOT, 'Red Hat 7.x', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nvar constraints = [\n {\n 'repo_relative_urls': [\n 'content/dist/rhel-alt/server/7/7Server/system-z-a/s390x/debug',\n 'content/dist/rhel-alt/server/7/7Server/system-z-a/s390x/optional/debug',\n 'content/dist/rhel-alt/server/7/7Server/system-z-a/s390x/optional/os',\n 'content/dist/rhel-alt/server/7/7Server/system-z-a/s390x/optional/source/SRPMS',\n 'content/dist/rhel-alt/server/7/7Server/system-z-a/s390x/os',\n 'content/dist/rhel-alt/server/7/7Server/system-z-a/s390x/source/SRPMS',\n 'content/dist/rhel/client/7/7Client/x86_64/debug',\n 'content/dist/rhel/client/7/7Client/x86_64/optional/debug',\n 'content/dist/rhel/client/7/7Client/x86_64/optional/os',\n 'content/dist/rhel/client/7/7Client/x86_64/optional/source/SRPMS',\n 'content/dist/rhel/client/7/7Client/x86_64/oracle-java-rm/os',\n 'content/dist/rhel/client/7/7Client/x86_64/os',\n 'content/dist/rhel/client/7/7Client/x86_64/source/SRPMS',\n 'content/dist/rhel/client/7/7Client/x86_64/supplementary/debug',\n 'content/dist/rhel/client/7/7Client/x86_64/supplementary/os',\n 'content/dist/rhel/client/7/7Client/x86_64/supplementary/source/SRPMS',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/debug',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/optional/debug',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/optional/os',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/optional/source/SRPMS',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/oracle-java-rm/os',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/os',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/source/SRPMS',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/supplementary/debug',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/supplementary/os',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/supplementary/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/highavailability/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/highavailability/os',\n 'content/dist/rhel/server/7/7Server/x86_64/highavailability/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/nfv/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/nfv/os',\n 'content/dist/rhel/server/7/7Server/x86_64/nfv/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/optional/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/optional/os',\n 'content/dist/rhel/server/7/7Server/x86_64/optional/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/oracle-java-rm/os',\n 'content/dist/rhel/server/7/7Server/x86_64/os',\n 'content/dist/rhel/server/7/7Server/x86_64/resilientstorage/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/resilientstorage/os',\n 'content/dist/rhel/server/7/7Server/x86_64/resilientstorage/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/rt/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/rt/os',\n 'content/dist/rhel/server/7/7Server/x86_64/rt/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/sap-hana/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/sap-hana/os',\n 'content/dist/rhel/server/7/7Server/x86_64/sap-hana/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/sap/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/sap/os',\n 'content/dist/rhel/server/7/7Server/x86_64/sap/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/supplementary/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/supplementary/os',\n 'content/dist/rhel/server/7/7Server/x86_64/supplementary/source/SRPMS',\n 'content/dist/rhel/system-z/7/7Server/s390x/debug',\n 'content/dist/rhel/system-z/7/7Server/s390x/highavailability/debug',\n 'content/dist/rhel/system-z/7/7Server/s390x/highavailability/os',\n 'content/dist/rhel/system-z/7/7Server/s390x/highavailability/source/SRPMS',\n 'content/dist/rhel/system-z/7/7Server/s390x/optional/debug',\n 'content/dist/rhel/system-z/7/7Server/s390x/optional/os',\n 'content/dist/rhel/system-z/7/7Server/s390x/optional/source/SRPMS',\n 'content/dist/rhel/system-z/7/7Server/s390x/os',\n 'content/dist/rhel/system-z/7/7Server/s390x/resilientstorage/debug',\n 'content/dist/rhel/system-z/7/7Server/s390x/resilientstorage/os',\n 'content/dist/rhel/system-z/7/7Server/s390x/resilientstorage/source/SRPMS',\n 'content/dist/rhel/system-z/7/7Server/s390x/sap/debug',\n 'content/dist/rhel/system-z/7/7Server/s390x/sap/os',\n 'content/dist/rhel/system-z/7/7Server/s390x/sap/source/SRPMS',\n 'content/dist/rhel/system-z/7/7Server/s390x/source/SRPMS',\n 'content/dist/rhel/system-z/7/7Server/s390x/supplementary/debug',\n 'content/dist/rhel/system-z/7/7Server/s390x/supplementary/os',\n 'content/dist/rhel/system-z/7/7Server/s390x/supplementary/source/SRPMS',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/debug',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/optional/debug',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/optional/os',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/optional/source/SRPMS',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/oracle-java-rm/os',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/os',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/source/SRPMS',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/supplementary/debug',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/supplementary/os',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/supplementary/source/SRPMS',\n 'content/fastrack/rhel/client/7/x86_64/debug',\n 'content/fastrack/rhel/client/7/x86_64/optional/debug',\n 'content/fastrack/rhel/client/7/x86_64/optional/os',\n 'content/fastrack/rhel/client/7/x86_64/optional/source/SRPMS',\n 'content/fastrack/rhel/client/7/x86_64/os',\n 'content/fastrack/rhel/client/7/x86_64/source/SRPMS',\n 'content/fastrack/rhel/computenode/7/x86_64/debug',\n 'content/fastrack/rhel/computenode/7/x86_64/optional/debug',\n 'content/fastrack/rhel/computenode/7/x86_64/optional/os',\n 'content/fastrack/rhel/computenode/7/x86_64/optional/source/SRPMS',\n 'content/fastrack/rhel/computenode/7/x86_64/os',\n 'content/fastrack/rhel/computenode/7/x86_64/source/SRPMS',\n 'content/fastrack/rhel/server/7/x86_64/debug',\n 'content/fastrack/rhel/server/7/x86_64/highavailability/debug',\n 'content/fastrack/rhel/server/7/x86_64/highavailability/os',\n 'content/fastrack/rhel/server/7/x86_64/highavailability/source/SRPMS',\n 'content/fastrack/rhel/server/7/x86_64/optional/debug',\n 'content/fastrack/rhel/server/7/x86_64/optional/os',\n 'content/fastrack/rhel/server/7/x86_64/optional/source/SRPMS',\n 'content/fastrack/rhel/server/7/x86_64/os',\n 'content/fastrack/rhel/server/7/x86_64/resilientstorage/debug',\n 'content/fastrack/rhel/server/7/x86_64/resilientstorage/os',\n 'content/fastrack/rhel/server/7/x86_64/resilientstorage/source/SRPMS',\n 'content/fastrack/rhel/server/7/x86_64/source/SRPMS',\n 'content/fastrack/rhel/system-z/7/s390x/debug',\n 'content/fastrack/rhel/system-z/7/s390x/optional/debug',\n 'content/fastrack/rhel/system-z/7/s390x/optional/os',\n 'content/fastrack/rhel/system-z/7/s390x/optional/source/SRPMS',\n 'content/fastrack/rhel/system-z/7/s390x/os',\n 'content/fastrack/rhel/system-z/7/s390x/source/SRPMS',\n 'content/fastrack/rhel/workstation/7/x86_64/debug',\n 'content/fastrack/rhel/workstation/7/x86_64/optional/debug',\n 'content/fastrack/rhel/workstation/7/x86_64/optional/os',\n 'content/fastrack/rhel/workstation/7/x86_64/optional/source/SRPMS',\n 'content/fastrack/rhel/workstation/7/x86_64/os',\n 'content/fastrack/rhel/workstation/7/x86_64/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'wireshark-1.10.14-24.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'wireshark-devel-1.10.14-24.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'wireshark-gnome-1.10.14-24.el7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'wireshark-gnome-1.10.14-24.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE}\n ]\n }\n];\n\nvar applicable_repo_urls = rhel_determine_applicable_repository_urls(constraints:constraints);\nif(applicable_repo_urls == RHEL_REPOS_NO_OVERLAP_MESSAGE) exit(0, RHEL_REPO_NOT_ENABLED);\n\nvar flag = 0;\nforeach var constraint_array ( constraints ) {\n var repo_relative_urls = NULL;\n if (!empty_or_null(constraint_array['repo_relative_urls'])) repo_relative_urls = constraint_array['repo_relative_urls'];\n foreach var pkg ( constraint_array['pkgs'] ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(pkg['reference'])) reference = pkg['reference'];\n if (!empty_or_null(pkg['release'])) _release = 'RHEL' + pkg['release'];\n if (!empty_or_null(pkg['sp'])) sp = pkg['sp'];\n if (!empty_or_null(pkg['cpu'])) _cpu = pkg['cpu'];\n if (!empty_or_null(pkg['el_string'])) el_string = pkg['el_string'];\n if (!empty_or_null(pkg['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = pkg['rpm_spec_vers_cmp'];\n if (!empty_or_null(pkg['epoch'])) epoch = pkg['epoch'];\n if (!empty_or_null(pkg['allowmaj'])) allowmaj = pkg['allowmaj'];\n if (!empty_or_null(pkg['exists_check'])) exists_check = pkg['exists_check'];\n if (reference &&\n _release &&\n rhel_decide_repo_relative_url_check(required_repo_url_list:repo_relative_urls) &&\n (applicable_repo_urls || (!exists_check || rpm_exists(release:_release, rpm:exists_check))) &&\n rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n var extra = NULL;\n if (empty_or_null(applicable_repo_urls)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'wireshark / wireshark-devel / wireshark-gnome');\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-01-25T14:33:10", "description": "The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:1047 advisory.\n\n - wireshark: Out-of-bounds read in packet-ldss.c (CVE-2018-11362)\n\n - wireshark: Multiple dissectors could crash (wnpa- sec-2018-36) (CVE-2018-14340)\n\n - wireshark: DICOM dissector infinite loop (wnpa- sec-2018-39) (CVE-2018-14341)\n\n - wireshark: Bazaar dissector infinite loop (wnpa- sec-2018-40) (CVE-2018-14368)\n\n - wireshark: Radiotap dissector crash (CVE-2018-16057)\n\n - wireshark: Infinite loop in the MMSE dissector (CVE-2018-19622)\n\n - wireshark: SIGCOMP dissector crash in packet-sigcomp.c (CVE-2018-7418)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-04-10T00:00:00", "type": "nessus", "title": "CentOS 7 : wireshark (CESA-2020:1047)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-11362", "CVE-2018-14340", "CVE-2018-14341", "CVE-2018-14368", "CVE-2018-16057", "CVE-2018-19622", "CVE-2018-7418"], "modified": "2020-06-05T00:00:00", "cpe": ["p-cpe:/a:centos:centos:wireshark", "p-cpe:/a:centos:centos:wireshark-devel", "p-cpe:/a:centos:centos:wireshark-gnome", "cpe:/o:centos:centos:7"], "id": "CENTOS_RHSA-2020-1047.NASL", "href": "https://www.tenable.com/plugins/nessus/135324", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2020:1047 and \n# CentOS Errata and Security Advisory 2020:1047 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(135324);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/06/05\");\n\n script_cve_id(\"CVE-2018-11362\", \"CVE-2018-14340\", \"CVE-2018-14341\", \"CVE-2018-14368\", \"CVE-2018-16057\", \"CVE-2018-19622\", \"CVE-2018-7418\");\n script_xref(name:\"RHSA\", value:\"2020:1047\");\n\n script_name(english:\"CentOS 7 : wireshark (CESA-2020:1047)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as\nreferenced in the RHSA-2020:1047 advisory.\n\n - wireshark: Out-of-bounds read in packet-ldss.c\n (CVE-2018-11362)\n\n - wireshark: Multiple dissectors could crash (wnpa-\n sec-2018-36) (CVE-2018-14340)\n\n - wireshark: DICOM dissector infinite loop (wnpa-\n sec-2018-39) (CVE-2018-14341)\n\n - wireshark: Bazaar dissector infinite loop (wnpa-\n sec-2018-40) (CVE-2018-14368)\n\n - wireshark: Radiotap dissector crash (CVE-2018-16057)\n\n - wireshark: Infinite loop in the MMSE dissector\n (CVE-2018-19622)\n\n - wireshark: SIGCOMP dissector crash in packet-sigcomp.c\n (CVE-2018-7418)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\"\n );\n # https://lists.centos.org/pipermail/centos-cr-announce/2020-April/012642.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0b95f64b\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected wireshark packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-14341\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:wireshark-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:wireshark-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/04/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/04/10\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 7.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"wireshark-1.10.14-24.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"wireshark-devel-1.10.14-24.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"wireshark-gnome-1.10.14-24.el7\")) flag++;\n\n\nif (flag)\n{\n cr_plugin_caveat = '\\n' +\n 'NOTE: The security advisory associated with this vulnerability has a\\n' +\n 'fixed package version that may only be available in the continuous\\n' +\n 'release (CR) repository for CentOS, until it is present in the next\\n' +\n 'point release of CentOS.\\n\\n' +\n\n 'If an equal or higher package level does not exist in the baseline\\n' +\n 'repository for your major version of CentOS, then updates from the CR\\n' +\n 'repository will need to be applied in order to address the\\n' +\n 'vulnerability.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + cr_plugin_caveat\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark / wireshark-devel / wireshark-gnome\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-02-10T14:55:05", "description": "The remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has wireshark packages installed that are affected by multiple vulnerabilities:\n\n - In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by avoiding a buffer over-read upon encountering a missing '\\0' character. (CVE-2018-11362)\n\n - In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by correcting the extraction of the length value. (CVE-2018-7418)\n\n - In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the MMSE dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-mmse.c by preventing length overflows. (CVE-2018-19622)\n\n - In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Radiotap dissector could crash. This was addressed in epan/dissectors/packet-ieee80211-radiotap-iter.c by validating iterator operations.\n (CVE-2018-16057)\n\n - In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read. (CVE-2018-14340)\n\n - In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow. (CVE-2018-14341)\n\n - In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that are too long. (CVE-2018-14368)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-12-09T00:00:00", "type": "nessus", "title": "NewStart CGSL CORE 5.04 / MAIN 5.04 : wireshark Multiple Vulnerabilities (NS-SA-2020-0064)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-11362", "CVE-2018-14340", "CVE-2018-14341", "CVE-2018-14368", "CVE-2018-16057", "CVE-2018-19622", "CVE-2018-7418"], "modified": "2020-12-10T00:00:00", "cpe": [], "id": "NEWSTART_CGSL_NS-SA-2020-0064_WIRESHARK.NASL", "href": "https://www.tenable.com/plugins/nessus/143927", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from ZTE advisory NS-SA-2020-0064. The text\n# itself is copyright (C) ZTE, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143927);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/12/10\");\n\n script_cve_id(\n \"CVE-2018-7418\",\n \"CVE-2018-11362\",\n \"CVE-2018-14340\",\n \"CVE-2018-14341\",\n \"CVE-2018-14368\",\n \"CVE-2018-16057\",\n \"CVE-2018-19622\"\n );\n script_bugtraq_id(\n 103157,\n 104308,\n 104847,\n 105174,\n 106051\n );\n\n script_name(english:\"NewStart CGSL CORE 5.04 / MAIN 5.04 : wireshark Multiple Vulnerabilities (NS-SA-2020-0064)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote machine is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has wireshark packages installed that are affected\nby multiple vulnerabilities:\n\n - In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LDSS dissector could crash. This was\n addressed in epan/dissectors/packet-ldss.c by avoiding a buffer over-read upon encountering a missing '\\0'\n character. (CVE-2018-11362)\n\n - In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This was addressed in\n epan/dissectors/packet-sigcomp.c by correcting the extraction of the length value. (CVE-2018-7418)\n\n - In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the MMSE dissector could go into an infinite loop. This\n was addressed in epan/dissectors/packet-mmse.c by preventing length overflows. (CVE-2018-19622)\n\n - In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Radiotap dissector could crash. This\n was addressed in epan/dissectors/packet-ieee80211-radiotap-iter.c by validating iterator operations.\n (CVE-2018-16057)\n\n - In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib\n decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid\n a buffer over-read. (CVE-2018-14340)\n\n - In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a\n large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset\n overflow. (CVE-2018-14341)\n\n - In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go\n into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that\n are too long. (CVE-2018-14368)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/notice/NS-SA-2020-0064\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade the vulnerable CGSL wireshark packages. Note that updated packages may not be available yet. Please contact ZTE\nfor more information.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-14368\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"NewStart CGSL Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/ZTE-CGSL/release\", \"Host/ZTE-CGSL/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item('Host/ZTE-CGSL/release');\nif (isnull(release) || release !~ \"^CGSL (MAIN|CORE)\") audit(AUDIT_OS_NOT, 'NewStart Carrier Grade Server Linux');\n\nif (release !~ \"CGSL CORE 5.04\" &&\n release !~ \"CGSL MAIN 5.04\")\n audit(AUDIT_OS_NOT, 'NewStart CGSL CORE 5.04 / NewStart CGSL MAIN 5.04');\n\nif (!get_kb_item('Host/ZTE-CGSL/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'NewStart Carrier Grade Server Linux', cpu);\n\nflag = 0;\n\npkgs = {\n 'CGSL CORE 5.04': [\n 'wireshark-1.10.14-24.el7',\n 'wireshark-debuginfo-1.10.14-24.el7',\n 'wireshark-devel-1.10.14-24.el7',\n 'wireshark-gnome-1.10.14-24.el7'\n ],\n 'CGSL MAIN 5.04': [\n 'wireshark-1.10.14-24.el7',\n 'wireshark-debuginfo-1.10.14-24.el7',\n 'wireshark-devel-1.10.14-24.el7',\n 'wireshark-gnome-1.10.14-24.el7'\n ]\n};\npkg_list = pkgs[release];\n\nforeach (pkg in pkg_list)\n if (rpm_check(release:'ZTE ' + release, reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'wireshark');\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-02-10T14:55:29", "description": "The remote NewStart CGSL host, running version CORE 5.05 / MAIN 5.05, has wireshark packages installed that are affected by multiple vulnerabilities:\n\n - In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by avoiding a buffer over-read upon encountering a missing '\\0' character. (CVE-2018-11362)\n\n - In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by correcting the extraction of the length value. (CVE-2018-7418)\n\n - In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the MMSE dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-mmse.c by preventing length overflows. (CVE-2018-19622)\n\n - In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Radiotap dissector could crash. This was addressed in epan/dissectors/packet-ieee80211-radiotap-iter.c by validating iterator operations.\n (CVE-2018-16057)\n\n - In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read. (CVE-2018-14340)\n\n - In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow. (CVE-2018-14341)\n\n - In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that are too long. (CVE-2018-14368)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-12-09T00:00:00", "type": "nessus", "title": "NewStart CGSL CORE 5.05 / MAIN 5.05 : wireshark Multiple Vulnerabilities (NS-SA-2020-0097)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-11362", "CVE-2018-14340", "CVE-2018-14341", "CVE-2018-14368", "CVE-2018-16057", "CVE-2018-19622", "CVE-2018-7418"], "modified": "2020-12-10T00:00:00", "cpe": [], "id": "NEWSTART_CGSL_NS-SA-2020-0097_WIRESHARK.NASL", "href": "https://www.tenable.com/plugins/nessus/143949", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from ZTE advisory NS-SA-2020-0097. The text\n# itself is copyright (C) ZTE, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143949);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/12/10\");\n\n script_cve_id(\n \"CVE-2018-7418\",\n \"CVE-2018-11362\",\n \"CVE-2018-14340\",\n \"CVE-2018-14341\",\n \"CVE-2018-14368\",\n \"CVE-2018-16057\",\n \"CVE-2018-19622\"\n );\n script_bugtraq_id(\n 103157,\n 104308,\n 104847,\n 105174,\n 106051\n );\n\n script_name(english:\"NewStart CGSL CORE 5.05 / MAIN 5.05 : wireshark Multiple Vulnerabilities (NS-SA-2020-0097)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote machine is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote NewStart CGSL host, running version CORE 5.05 / MAIN 5.05, has wireshark packages installed that are affected\nby multiple vulnerabilities:\n\n - In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LDSS dissector could crash. This was\n addressed in epan/dissectors/packet-ldss.c by avoiding a buffer over-read upon encountering a missing '\\0'\n character. (CVE-2018-11362)\n\n - In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This was addressed in\n epan/dissectors/packet-sigcomp.c by correcting the extraction of the length value. (CVE-2018-7418)\n\n - In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the MMSE dissector could go into an infinite loop. This\n was addressed in epan/dissectors/packet-mmse.c by preventing length overflows. (CVE-2018-19622)\n\n - In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Radiotap dissector could crash. This\n was addressed in epan/dissectors/packet-ieee80211-radiotap-iter.c by validating iterator operations.\n (CVE-2018-16057)\n\n - In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib\n decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid\n a buffer over-read. (CVE-2018-14340)\n\n - In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a\n large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset\n overflow. (CVE-2018-14341)\n\n - In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go\n into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that\n are too long. (CVE-2018-14368)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/notice/NS-SA-2020-0097\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade the vulnerable CGSL wireshark packages. Note that updated packages may not be available yet. Please contact ZTE\nfor more information.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-14368\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"NewStart CGSL Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/ZTE-CGSL/release\", \"Host/ZTE-CGSL/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item('Host/ZTE-CGSL/release');\nif (isnull(release) || release !~ \"^CGSL (MAIN|CORE)\") audit(AUDIT_OS_NOT, 'NewStart Carrier Grade Server Linux');\n\nif (release !~ \"CGSL CORE 5.05\" &&\n release !~ \"CGSL MAIN 5.05\")\n audit(AUDIT_OS_NOT, 'NewStart CGSL CORE 5.05 / NewStart CGSL MAIN 5.05');\n\nif (!get_kb_item('Host/ZTE-CGSL/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'NewStart Carrier Grade Server Linux', cpu);\n\nflag = 0;\n\npkgs = {\n 'CGSL CORE 5.05': [\n 'wireshark-1.10.14-24.el7',\n 'wireshark-debuginfo-1.10.14-24.el7',\n 'wireshark-devel-1.10.14-24.el7',\n 'wireshark-gnome-1.10.14-24.el7'\n ],\n 'CGSL MAIN 5.05': [\n 'wireshark-1.10.14-24.el7',\n 'wireshark-debuginfo-1.10.14-24.el7',\n 'wireshark-devel-1.10.14-24.el7',\n 'wireshark-gnome-1.10.14-24.el7'\n ]\n};\npkg_list = pkgs[release];\n\nforeach (pkg in pkg_list)\n if (rpm_check(release:'ZTE ' + release, reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'wireshark');\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-01-25T14:31:45", "description": "* wireshark: Out-of-bounds read in packet-ldss.c * wireshark: Multiple dissectors could crash (wnpa-sec-2018-36) * wireshark: DICOM dissector infinite loop (wnpa-sec-2018-39) * wireshark: Bazaar dissector infinite loop (wnpa-sec-2018-40) * wireshark: SIGCOMP dissector crash in packet-sigcomp.c * wireshark: Radiotap dissector crash * wireshark:\nInfinite loop in the MMSE dissector", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-04-21T00:00:00", "type": "nessus", "title": "Scientific Linux Security Update : wireshark on SL7.x x86_64 (20200407)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-11362", "CVE-2018-14340", "CVE-2018-14341", "CVE-2018-14368", "CVE-2018-16057", "CVE-2018-19622", "CVE-2018-7418"], "modified": "2020-04-24T00:00:00", "cpe": ["p-cpe:/a:fermilab:scientific_linux:wireshark", "p-cpe:/a:fermilab:scientific_linux:wireshark-debuginfo", "p-cpe:/a:fermilab:scientific_linux:wireshark-devel", "p-cpe:/a:fermilab:scientific_linux:wireshark-gnome", "x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20200407_WIRESHARK_ON_SL7_X.NASL", "href": "https://www.tenable.com/plugins/nessus/135842", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(135842);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/04/24\");\n\n script_cve_id(\"CVE-2018-11362\", \"CVE-2018-14340\", \"CVE-2018-14341\", \"CVE-2018-14368\", \"CVE-2018-16057\", \"CVE-2018-19622\", \"CVE-2018-7418\");\n\n script_name(english:\"Scientific Linux Security Update : wireshark on SL7.x x86_64 (20200407)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"* wireshark: Out-of-bounds read in packet-ldss.c * wireshark: Multiple\ndissectors could crash (wnpa-sec-2018-36) * wireshark: DICOM dissector\ninfinite loop (wnpa-sec-2018-39) * wireshark: Bazaar dissector\ninfinite loop (wnpa-sec-2018-40) * wireshark: SIGCOMP dissector crash\nin packet-sigcomp.c * wireshark: Radiotap dissector crash * wireshark:\nInfinite loop in the MMSE dissector\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind2004&L=SCIENTIFIC-LINUX-ERRATA&P=12944\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b6a3525a\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:wireshark-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:wireshark-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:wireshark-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/04/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/04/21\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nos_ver = pregmatch(pattern: \"Scientific Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Scientific Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Scientific Linux 7.x\", \"Scientific Linux \" + os_ver);\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"wireshark-1.10.14-24.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"wireshark-debuginfo-1.10.14-24.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"wireshark-devel-1.10.14-24.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"wireshark-gnome-1.10.14-24.el7\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark / wireshark-debuginfo / wireshark-devel / wireshark-gnome\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-01-11T16:28:17", "description": "Wireshark was updated to 1.12.9 to fix a number of crashes in protocol dissectors. [boo#960382]\n\n - CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.\n\n - CVE-2015-8712: The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.\n\n - CVE-2015-8714: The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.\n\n - CVE-2015-8716: The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8717: The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8718: Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets for async NLM' option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8719: The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8720: The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8721: Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.\n\n - CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.\n\n - CVE-2015-8723: The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted\n\n - CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.\n\n - CVE-2015-8725: The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.\n\n - CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.\n\n - CVE-2015-8727: The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.\n\n - CVE-2015-8728: The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.\n\n - CVE-2015-8729: The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.\n\n - CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.\n\n - CVE-2015-8731: The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.\n\n - CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.\n\n - CVE-2015-8733: The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2016-01-11T00:00:00", "type": "nessus", "title": "openSUSE Security Update : wireshark (openSUSE-2016-12)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-8711", "CVE-2015-8712", "CVE-2015-8713", "CVE-2015-8714", "CVE-2015-8715", "CVE-2015-8716", "CVE-2015-8717", "CVE-2015-8718", "CVE-2015-8719", "CVE-2015-8720", "CVE-2015-8721", "CVE-2015-8722", "CVE-2015-8723", "CVE-2015-8724", "CVE-2015-8725", "CVE-2015-8726", "CVE-2015-8727", "CVE-2015-8728", "CVE-2015-8729", "CVE-2015-8730", "CVE-2015-8731", "CVE-2015-8732", "CVE-2015-8733"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:wireshark", "p-cpe:/a:novell:opensuse:wireshark-debuginfo", "p-cpe:/a:novell:opensuse:wireshark-debugsource", "p-cpe:/a:novell:opensuse:wireshark-devel", "p-cpe:/a:novell:opensuse:wireshark-ui-gtk", "p-cpe:/a:novell:opensuse:wireshark-ui-gtk-debuginfo", "p-cpe:/a:novell:opensuse:wireshark-ui-qt", "p-cpe:/a:novell:opensuse:wireshark-ui-qt-debuginfo", "cpe:/o:novell:opensuse:13.1", "cpe:/o:novell:opensuse:13.2", "cpe:/o:novell:opensuse:42.1"], "id": "OPENSUSE-2016-12.NASL", "href": "https://www.tenable.com/plugins/nessus/87833", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2016-12.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(87833);\n script_version(\"2.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-8711\", \"CVE-2015-8712\", \"CVE-2015-8713\", \"CVE-2015-8714\", \"CVE-2015-8715\", \"CVE-2015-8716\", \"CVE-2015-8717\", \"CVE-2015-8718\", \"CVE-2015-8719\", \"CVE-2015-8720\", \"CVE-2015-8721\", \"CVE-2015-8722\", \"CVE-2015-8723\", \"CVE-2015-8724\", \"CVE-2015-8725\", \"CVE-2015-8726\", \"CVE-2015-8727\", \"CVE-2015-8728\", \"CVE-2015-8729\", \"CVE-2015-8730\", \"CVE-2015-8731\", \"CVE-2015-8732\", \"CVE-2015-8733\");\n\n script_name(english:\"openSUSE Security Update : wireshark (openSUSE-2016-12)\");\n script_summary(english:\"Check for the openSUSE-2016-12 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Wireshark was updated to 1.12.9 to fix a number of crashes in protocol\ndissectors. [boo#960382]\n\n - CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not validate conversation data, which\n allows remote attackers to cause a denial of service\n (NULL pointer dereference and application crash) via a\n crafted packet.\n\n - CVE-2015-8712: The dissect_hsdsch_channel_info function\n in epan/dissectors/packet-umts_fp.c in the UMTS FP\n dissector in Wireshark 1.12.x before 1.12.9 does not\n validate the number of PDUs, which allows remote\n attackers to cause a denial of service (application\n crash) via a crafted packet.\n\n - CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the\n UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does\n not properly reserve memory for channel ID mappings,\n which allows remote attackers to cause a denial of\n service (out-of-bounds memory access and application\n crash) via a crafted packet.\n\n - CVE-2015-8714: The dissect_dcom_OBJREF function in\n epan/dissectors/packet-dcom.c in the DCOM dissector in\n Wireshark 1.12.x before 1.12.9 does not initialize a\n certain IPv4 data structure, which allows remote\n attackers to cause a denial of service (application\n crash) via a crafted packet.\n\n - CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the\n AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does\n not check for empty arguments, which allows remote\n attackers to cause a denial of service (infinite loop)\n via a crafted packet.\n\n - CVE-2015-8716: The init_t38_info_conv function in\n epan/dissectors/packet-t38.c in the T.38 dissector in\n Wireshark 1.12.x before 1.12.9 does not ensure that a\n conversation exists, which allows remote attackers to\n cause a denial of service (application crash) via a\n crafted packet.\n\n - CVE-2015-8717: The dissect_sdp function in\n epan/dissectors/packet-sdp.c in the SDP dissector in\n Wireshark 1.12.x before 1.12.9 does not prevent use of a\n negative media count, which allows remote attackers to\n cause a denial of service (application crash) via a\n crafted packet.\n\n - CVE-2015-8718: Double free vulnerability in\n epan/dissectors/packet-nlm.c in the NLM dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1,\n when the 'Match MSG/RES packets for async NLM' option is\n enabled, allows remote attackers to cause a denial of\n service (application crash) via a crafted packet.\n\n - CVE-2015-8719: The dissect_dns_answer function in\n epan/dissectors/packet-dns.c in the DNS dissector in\n Wireshark 1.12.x before 1.12.9 mishandles the EDNS0\n Client Subnet option, which allows remote attackers to\n cause a denial of service (application crash) via a\n crafted packet.\n\n - CVE-2015-8720: The dissect_ber_GeneralizedTime function\n in epan/dissectors/packet-ber.c in the BER dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n improperly checks an sscanf return value, which allows\n remote attackers to cause a denial of service\n (application crash) via a crafted packet.\n\n - CVE-2015-8721: Buffer overflow in the tvb_uncompress\n function in epan/tvbuff_zlib.c in Wireshark 1.12.x\n before 1.12.9 and 2.0.x before 2.0.1 allows remote\n attackers to cause a denial of service (application\n crash) via a crafted packet with zlib compression.\n\n - CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not validate the frame pointer, which\n allows remote attackers to cause a denial of service\n (NULL pointer dereference and application crash) via a\n crafted packet.\n\n - CVE-2015-8723: The AirPDcapPacketProcess function in\n epan/crypt/airpdcap.c in the 802.11 dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n does not validate the relationship between the total\n length and the capture length, which allows remote\n attackers to cause a denial of service (stack-based\n buffer overflow and application crash) via a crafted\n\n - CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey\n function in epan/crypt/airpdcap.c in the 802.11\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not verify the WPA broadcast key\n length, which allows remote attackers to cause a denial\n of service (out-of-bounds read and application crash)\n via a crafted packet.\n\n - CVE-2015-8725: The\n dissect_diameter_base_framed_ipv6_prefix function in\n epan/dissectors/packet-diameter.c in the DIAMETER\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not validate the IPv6 prefix length,\n which allows remote attackers to cause a denial of\n service (stack-based buffer overflow and application\n crash) via a crafted packet.\n\n - CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser\n in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n does not validate certain signature and Modulation and\n Coding Scheme (MCS) data, which allows remote attackers\n to cause a denial of service (out-of-bounds read and\n application crash) via a crafted file.\n\n - CVE-2015-8727: The dissect_rsvp_common function in\n epan/dissectors/packet-rsvp.c in the RSVP dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n does not properly maintain request-key data, which\n allows remote attackers to cause a denial of service\n (use-after-free and application crash) via a crafted\n packet.\n\n - CVE-2015-8728: The Mobile Identity parser in (1)\n epan/dissectors/packet-ansi_a.c in the ANSI A dissector\n and (2) epan/dissectors/packet-gsm_a_common.c in the GSM\n A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 improperly uses the\n tvb_bcd_dig_to_wmem_packet_str function, which allows\n remote attackers to cause a denial of service (buffer\n overflow and application crash) via a crafted packet.\n\n - CVE-2015-8729: The ascend_seek function in\n wiretap/ascendtext.c in the Ascend file parser in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n does not ensure the presence of a '\\0' character at the\n end of a date string, which allows remote attackers to\n cause a denial of service (out-of-bounds read and\n application crash) via a crafted file.\n\n - CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not validate the number of items,\n which allows remote attackers to cause a denial of\n service (invalid read operation and application crash)\n via a crafted packet.\n\n - CVE-2015-8731: The dissct_rsl_ipaccess_msg function in\n epan/dissectors/packet-rsl.c in the RSL dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n does not reject unknown TLV types, which allows remote\n attackers to cause a denial of service (out-of-bounds\n read and application crash) via a crafted packet.\n\n - CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp\n function in epan/dissectors/packet-zbee-zcl-general.c in\n the ZigBee ZCL dissector in Wireshark 1.12.x before\n 1.12.9 and 2.0.x before 2.0.1 does not validate the\n Total Profile Number field, which allows remote\n attackers to cause a denial of service (out-of-bounds\n read and application crash) via a crafted packet.\n\n - CVE-2015-8733: The ngsniffer_process_record function in\n wiretap/ngsniffer.c in the Sniffer file parser in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n does not validate the relationships between record\n lengths and record header lengths, which allows remote\n attackers to cause a denial of service (out-of-bounds\n read and application crash) via a crafted file.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=960382\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected wireshark packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-gtk-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-qt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/01/11\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1|SUSE13\\.2|SUSE42\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1 / 13.2 / 42.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"wireshark-1.12.9-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"wireshark-debuginfo-1.12.9-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"wireshark-debugsource-1.12.9-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"wireshark-devel-1.12.9-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"wireshark-ui-gtk-1.12.9-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"wireshark-ui-gtk-debuginfo-1.12.9-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"wireshark-ui-qt-1.12.9-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"wireshark-ui-qt-debuginfo-1.12.9-47.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-1.12.9-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-debuginfo-1.12.9-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-debugsource-1.12.9-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-devel-1.12.9-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-ui-gtk-1.12.9-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-ui-gtk-debuginfo-1.12.9-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-ui-qt-1.12.9-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-ui-qt-debuginfo-1.12.9-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-1.12.9-14.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-debuginfo-1.12.9-14.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-debugsource-1.12.9-14.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-devel-1.12.9-14.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-ui-gtk-1.12.9-14.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-ui-gtk-debuginfo-1.12.9-14.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-ui-qt-1.12.9-14.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-ui-qt-debuginfo-1.12.9-14.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark / wireshark-debuginfo / wireshark-debugsource / etc\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-03-10T14:23:41", "description": "The version of Wireshark installed on the remote Windows host is 1.12.x prior to 1.12.9. It is, therefore, affected by multiple denial of service vulnerabilities in the following components :\n\n - 802.11 dissector\n - AllJoyn dissector\n - ANSI A dissector\n - Ascend file parser\n - BER dissector\n - DCOM dissector\n - DIAMETER dissector\n - DNS dissector\n - GSM A dissector\n - NBAP dissector\n - NLM dissector\n - RSL dissector\n - RSVP dissector\n - SCTP dissector\n - SDP dissector\n - Sniffer file parser\n - T.38 dissector\n - UMTS FP dissector\n - VeriWave file parser\n - ZigBee ZCL dissector\n - zlib compression\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2016-01-08T00:00:00", "type": "nessus", "title": "Wireshark 1.12.x < 1.12.9 Multiple DoS", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-8711", "CVE-2015-8712", "CVE-2015-8713", "CVE-2015-8714", "CVE-2015-8715", "CVE-2015-8716", "CVE-2015-8717", "CVE-2015-8718", "CVE-2015-8719", "CVE-2015-8720", "CVE-2015-8721", "CVE-2015-8722", "CVE-2015-8723", "CVE-2015-8724", "CVE-2015-8725", "CVE-2015-8726", "CVE-2015-8727", "CVE-2015-8728", "CVE-2015-8729", "CVE-2015-8730", "CVE-2015-8731", "CVE-2015-8732", "CVE-2015-8733"], "modified": "2023-03-09T00:00:00", "cpe": ["cpe:/a:wireshark:wireshark"], "id": "WIRESHARK_1_12_9.NASL", "href": "https://www.tenable.com/plugins/nessus/87824", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(87824);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/03/09\");\n\n script_cve_id(\n \"CVE-2015-8711\",\n \"CVE-2015-8712\",\n \"CVE-2015-8713\",\n \"CVE-2015-8714\",\n \"CVE-2015-8715\",\n \"CVE-2015-8716\",\n \"CVE-2015-8717\",\n \"CVE-2015-8718\",\n \"CVE-2015-8719\",\n \"CVE-2015-8720\",\n \"CVE-2015-8721\",\n \"CVE-2015-8722\",\n \"CVE-2015-8723\",\n \"CVE-2015-8724\",\n \"CVE-2015-8725\",\n \"CVE-2015-8726\",\n \"CVE-2015-8727\",\n \"CVE-2015-8728\",\n \"CVE-2015-8729\",\n \"CVE-2015-8730\",\n \"CVE-2015-8731\",\n \"CVE-2015-8732\",\n \"CVE-2015-8733\"\n );\n script_xref(name:\"EDB-ID\", value:\"38995\");\n script_xref(name:\"EDB-ID\", value:\"38996\");\n script_xref(name:\"EDB-ID\", value:\"38999\");\n script_xref(name:\"EDB-ID\", value:\"39000\");\n script_xref(name:\"EDB-ID\", value:\"39001\");\n script_xref(name:\"EDB-ID\", value:\"39002\");\n script_xref(name:\"EDB-ID\", value:\"39003\");\n script_xref(name:\"EDB-ID\", value:\"39004\");\n script_xref(name:\"EDB-ID\", value:\"39005\");\n script_xref(name:\"EDB-ID\", value:\"39006\");\n script_xref(name:\"EDB-ID\", value:\"39076\");\n script_xref(name:\"EDB-ID\", value:\"39077\");\n\n script_name(english:\"Wireshark 1.12.x < 1.12.9 Multiple DoS\");\n script_summary(english:\"Checks the version of Wireshark.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host has an application installed that is affected\nby multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Wireshark installed on the remote Windows host is\n1.12.x prior to 1.12.9. It is, therefore, affected by multiple\ndenial of service vulnerabilities in the following components :\n\n - 802.11 dissector\n - AllJoyn dissector\n - ANSI A dissector\n - Ascend file parser\n - BER dissector\n - DCOM dissector\n - DIAMETER dissector\n - DNS dissector\n - GSM A dissector\n - NBAP dissector\n - NLM dissector\n - RSL dissector\n - RSVP dissector\n - SCTP dissector\n - SDP dissector\n - Sniffer file parser\n - T.38 dissector\n - UMTS FP dissector\n - VeriWave file parser\n - ZigBee ZCL dissector\n - zlib compression\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.9.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Wireshark version 1.12.9 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-8733\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/03/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/12/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/01/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:wireshark:wireshark\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"wireshark_installed.nasl\");\n script_require_keys(\"installed_sw/Wireshark\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\nget_kb_item_or_exit('SMB/Registry/Enumerated');\n\nvar app_info = vcf::get_app_info(app:'Wireshark', win_local:TRUE);\n\nvar constraints = [\n { 'min_version' : '1.12.0', 'max_version' : '1.12.8', 'fixed_version' : '1.12.9' }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-01-11T16:34:41", "description": "Multiple vulnerabilities were discovered in the dissectors/parsers for DNP, RSL, LLRP, GSM A-bis OML, ASN 1 BER which could result in denial of service.", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-03-14T00:00:00", "type": "nessus", "title": "Debian DSA-3516-1 : wireshark - security update", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-8731", "CVE-2016-2523", "CVE-2016-2530", "CVE-2016-2531", "CVE-2016-2532", "CVE-2016-4417", "CVE-2016-4418", "CVE-2016-4421"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:wireshark", "cpe:/o:debian:debian_linux:7.0", "cpe:/o:debian:debian_linux:8.0"], "id": "DEBIAN_DSA-3516.NASL", "href": "https://www.tenable.com/plugins/nessus/89878", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3516. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(89878);\n script_version(\"2.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-8731\", \"CVE-2016-2523\", \"CVE-2016-2530\", \"CVE-2016-2531\", \"CVE-2016-2532\", \"CVE-2016-4417\", \"CVE-2016-4418\", \"CVE-2016-4421\");\n script_xref(name:\"DSA\", value:\"3516\");\n\n script_name(english:\"Debian DSA-3516-1 : wireshark - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities were discovered in the dissectors/parsers for\nDNP, RSL, LLRP, GSM A-bis OML, ASN 1 BER which could result in denial\nof service.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/wireshark\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/wireshark\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2016/dsa-3516\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the wireshark packages.\n\nFor the oldstable distribution (wheezy), these problems have been\nfixed in version 1.8.2-5wheezy18.\n\nFor the stable distribution (jessie), these problems have been fixed\nin version 1.12.1+g01b65bf-4+deb8u5.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/03/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/03/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark-data\", reference:\"1.8.2-5wheezy18\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark-dev\", reference:\"1.8.2-5wheezy18\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark2\", reference:\"1.8.2-5wheezy18\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwiretap-dev\", reference:\"1.8.2-5wheezy18\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwiretap2\", reference:\"1.8.2-5wheezy18\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwsutil-dev\", reference:\"1.8.2-5wheezy18\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwsutil2\", reference:\"1.8.2-5wheezy18\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"tshark\", reference:\"1.8.2-5wheezy18\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark\", reference:\"1.8.2-5wheezy18\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-common\", reference:\"1.8.2-5wheezy18\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-dbg\", reference:\"1.8.2-5wheezy18\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-dev\", reference:\"1.8.2-5wheezy18\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-doc\", reference:\"1.8.2-5wheezy18\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark-data\", reference:\"1.12.1+g01b65bf-4+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark5\", reference:\"1.12.1+g01b65bf-4+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwiretap-dev\", reference:\"1.12.1+g01b65bf-4+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwiretap4\", reference:\"1.12.1+g01b65bf-4+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwsutil-dev\", reference:\"1.12.1+g01b65bf-4+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwsutil4\", reference:\"1.12.1+g01b65bf-4+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"tshark\", reference:\"1.12.1+g01b65bf-4+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark\", reference:\"1.12.1+g01b65bf-4+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-common\", reference:\"1.12.1+g01b65bf-4+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-dbg\", reference:\"1.12.1+g01b65bf-4+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-doc\", reference:\"1.12.1+g01b65bf-4+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-qt\", reference:\"1.12.1+g01b65bf-4+deb8u5\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-01-11T16:28:31", "description": "This update contains Wireshark 1.12.9 and fixes the following issues :\n\n - CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437)\n\n - CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.\n\n - CVE-2015-8712: The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.\n\n - CVE-2015-8714: The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.\n\n - CVE-2015-8716: The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8717: The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8718: Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets for async NLM' option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8719: The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8720: The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8721: Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.\n\n - CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.\n\n - CVE-2015-8723: The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted\n\n - CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.\n\n - CVE-2015-8725: The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.\n\n - CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.\n\n - CVE-2015-8727: The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.\n\n - CVE-2015-8728: The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.\n\n - CVE-2015-8729: The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.\n\n - CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.\n\n - CVE-2015-8731: The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.\n\n - CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.\n\n - CVE-2015-8733: The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2016-01-14T00:00:00", "type": "nessus", "title": "SUSE SLED11 / SLES11 Security Update : wireshark (SUSE-SU-2016:0110-1)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7830", "CVE-2015-8711", "CVE-2015-8712", "CVE-2015-8713", "CVE-2015-8714", "CVE-2015-8715", "CVE-2015-8716", "CVE-2015-8717", "CVE-2015-8718", "CVE-2015-8719", "CVE-2015-8720", "CVE-2015-8721", "CVE-2015-8722", "CVE-2015-8723", "CVE-2015-8724", "CVE-2015-8725", "CVE-2015-8726", "CVE-2015-8727", "CVE-2015-8728", "CVE-2015-8729", "CVE-2015-8730", "CVE-2015-8731", "CVE-2015-8732", "CVE-2015-8733"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:wireshark", "cpe:/o:novell:suse_linux:11"], "id": "SUSE_SU-2016-0110-1.NASL", "href": "https://www.tenable.com/plugins/nessus/87912", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2016:0110-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(87912);\n script_version(\"2.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2015-7830\", \"CVE-2015-8711\", \"CVE-2015-8712\", \"CVE-2015-8713\", \"CVE-2015-8714\", \"CVE-2015-8715\", \"CVE-2015-8716\", \"CVE-2015-8717\", \"CVE-2015-8718\", \"CVE-2015-8719\", \"CVE-2015-8720\", \"CVE-2015-8721\", \"CVE-2015-8722\", \"CVE-2015-8723\", \"CVE-2015-8724\", \"CVE-2015-8725\", \"CVE-2015-8726\", \"CVE-2015-8727\", \"CVE-2015-8728\", \"CVE-2015-8729\", \"CVE-2015-8730\", \"CVE-2015-8731\", \"CVE-2015-8732\", \"CVE-2015-8733\");\n\n script_name(english:\"SUSE SLED11 / SLES11 Security Update : wireshark (SUSE-SU-2016:0110-1)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update contains Wireshark 1.12.9 and fixes the following issues :\n\n - CVE-2015-7830: pcapng file parser could crash while\n copying an interface filter (bsc#950437)\n\n - CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not validate conversation data, which\n allows remote attackers to cause a denial of service\n (NULL pointer dereference and application crash) via a\n crafted packet.\n\n - CVE-2015-8712: The dissect_hsdsch_channel_info function\n in epan/dissectors/packet-umts_fp.c in the UMTS FP\n dissector in Wireshark 1.12.x before 1.12.9 does not\n validate the number of PDUs, which allows remote\n attackers to cause a denial of service (application\n crash) via a crafted packet.\n\n - CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the\n UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does\n not properly reserve memory for channel ID mappings,\n which allows remote attackers to cause a denial of\n service (out-of-bounds memory access and application\n crash) via a crafted packet.\n\n - CVE-2015-8714: The dissect_dcom_OBJREF function in\n epan/dissectors/packet-dcom.c in the DCOM dissector in\n Wireshark 1.12.x before 1.12.9 does not initialize a\n certain IPv4 data structure, which allows remote\n attackers to cause a denial of service (application\n crash) via a crafted packet.\n\n - CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the\n AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does\n not check for empty arguments, which allows remote\n attackers to cause a denial of service (infinite loop)\n via a crafted packet.\n\n - CVE-2015-8716: The init_t38_info_conv function in\n epan/dissectors/packet-t38.c in the T.38 dissector in\n Wireshark 1.12.x before 1.12.9 does not ensure that a\n conversation exists, which allows remote attackers to\n cause a denial of service (application crash) via a\n crafted packet.\n\n - CVE-2015-8717: The dissect_sdp function in\n epan/dissectors/packet-sdp.c in the SDP dissector in\n Wireshark 1.12.x before 1.12.9 does not prevent use of a\n negative media count, which allows remote attackers to\n cause a denial of service (application crash) via a\n crafted packet.\n\n - CVE-2015-8718: Double free vulnerability in\n epan/dissectors/packet-nlm.c in the NLM dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1,\n when the 'Match MSG/RES packets for async NLM' option is\n enabled, allows remote attackers to cause a denial of\n service (application crash) via a crafted packet.\n\n - CVE-2015-8719: The dissect_dns_answer function in\n epan/dissectors/packet-dns.c in the DNS dissector in\n Wireshark 1.12.x before 1.12.9 mishandles the EDNS0\n Client Subnet option, which allows remote attackers to\n cause a denial of service (application crash) via a\n crafted packet.\n\n - CVE-2015-8720: The dissect_ber_GeneralizedTime function\n in epan/dissectors/packet-ber.c in the BER dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n improperly checks an sscanf return value, which allows\n remote attackers to cause a denial of service\n (application crash) via a crafted packet.\n\n - CVE-2015-8721: Buffer overflow in the tvb_uncompress\n function in epan/tvbuff_zlib.c in Wireshark 1.12.x\n before 1.12.9 and 2.0.x before 2.0.1 allows remote\n attackers to cause a denial of service (application\n crash) via a crafted packet with zlib compression.\n\n - CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not validate the frame pointer, which\n allows remote attackers to cause a denial of service\n (NULL pointer dereference and application crash) via a\n crafted packet.\n\n - CVE-2015-8723: The AirPDcapPacketProcess function in\n epan/crypt/airpdcap.c in the 802.11 dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n does not validate the relationship between the total\n length and the capture length, which allows remote\n attackers to cause a denial of service (stack-based\n buffer overflow and application crash) via a crafted\n\n - CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey\n function in epan/crypt/airpdcap.c in the 802.11\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not verify the WPA broadcast key\n length, which allows remote attackers to cause a denial\n of service (out-of-bounds read and application crash)\n via a crafted packet.\n\n - CVE-2015-8725: The\n dissect_diameter_base_framed_ipv6_prefix function in\n epan/dissectors/packet-diameter.c in the DIAMETER\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not validate the IPv6 prefix length,\n which allows remote attackers to cause a denial of\n service (stack-based buffer overflow and application\n crash) via a crafted packet.\n\n - CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser\n in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n does not validate certain signature and Modulation and\n Coding Scheme (MCS) data, which allows remote attackers\n to cause a denial of service (out-of-bounds read and\n application crash) via a crafted file.\n\n - CVE-2015-8727: The dissect_rsvp_common function in\n epan/dissectors/packet-rsvp.c in the RSVP dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n does not properly maintain request-key data, which\n allows remote attackers to cause a denial of service\n (use-after-free and application crash) via a crafted\n packet.\n\n - CVE-2015-8728: The Mobile Identity parser in (1)\n epan/dissectors/packet-ansi_a.c in the ANSI A dissector\n and (2) epan/dissectors/packet-gsm_a_common.c in the GSM\n A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 improperly uses the\n tvb_bcd_dig_to_wmem_packet_str function, which allows\n remote attackers to cause a denial of service (buffer\n overflow and application crash) via a crafted packet.\n\n - CVE-2015-8729: The ascend_seek function in\n wiretap/ascendtext.c in the Ascend file parser in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n does not ensure the presence of a '\\0' character at the\n end of a date string, which allows remote attackers to\n cause a denial of service (out-of-bounds read and\n application crash) via a crafted file.\n\n - CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not validate the number of items,\n which allows remote attackers to cause a denial of\n service (invalid read operation and application crash)\n via a crafted packet.\n\n - CVE-2015-8731: The dissct_rsl_ipaccess_msg function in\n epan/dissectors/packet-rsl.c in the RSL dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n does not reject unknown TLV types, which allows remote\n attackers to cause a denial of service (out-of-bounds\n read and application crash) via a crafted packet.\n\n - CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp\n function in epan/dissectors/packet-zbee-zcl-general.c in\n the ZigBee ZCL dissector in Wireshark 1.12.x before\n 1.12.9 and 2.0.x before 2.0.1 does not validate the\n Total Profile Number field, which allows remote\n attackers to cause a denial of service (out-of-bounds\n read and application crash) via a crafted packet.\n\n - CVE-2015-8733: The ngsniffer_process_record function in\n wiretap/ngsniffer.c in the Sniffer file parser in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n does not validate the relationships between record\n lengths and record header lengths, which allows remote\n attackers to cause a denial of service (out-of-bounds\n read and application crash) via a crafted file.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=950437\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=960382\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7830/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8711/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8712/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8713/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8714/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8715/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8716/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8717/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8718/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8719/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8720/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8721/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8722/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8723/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8724/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8725/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8726/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8727/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8728/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8729/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8730/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8731/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8732/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8733/\"\n );\n # https://www.suse.com/support/update/announcement/2016/suse-su-20160110-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c9cb4d7d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 11-SP4 :\n\nzypper in -t patch sdksp4-wireshark-12322=1\n\nSUSE Linux Enterprise Software Development Kit 11-SP3 :\n\nzypper in -t patch sdksp3-wireshark-12322=1\n\nSUSE Linux Enterprise Server for VMWare 11-SP3 :\n\nzypper in -t patch slessp3-wireshark-12322=1\n\nSUSE Linux Enterprise Server 11-SP4 :\n\nzypper in -t patch slessp4-wireshark-12322=1\n\nSUSE Linux Enterprise Server 11-SP3 :\n\nzypper in -t patch slessp3-wireshark-12322=1\n\nSUSE Linux Enterprise Desktop 11-SP4 :\n\nzypper in -t patch sledsp4-wireshark-12322=1\n\nSUSE Linux Enterprise Desktop 11-SP3 :\n\nzypper in -t patch sledsp3-wireshark-12322=1\n\nSUSE Linux Enterprise Debuginfo 11-SP4 :\n\nzypper in -t patch dbgsp4-wireshark-12322=1\n\nSUSE Linux Enterprise Debuginfo 11-SP3 :\n\nzypper in -t patch dbgsp3-wireshark-12322=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/01/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/01/14\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED11|SLES11)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED11 / SLES11\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES11\" && (! preg(pattern:\"^(3|4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES11 SP3/4\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED11\" && (! preg(pattern:\"^(3|4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED11 SP3/4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"wireshark-1.12.9-0.12.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", reference:\"wireshark-1.12.9-0.12.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"4\", cpu:\"x86_64\", reference:\"wireshark-1.12.9-0.12.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"4\", cpu:\"i586\", reference:\"wireshark-1.12.9-0.12.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"3\", cpu:\"x86_64\", reference:\"wireshark-1.12.9-0.12.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"3\", cpu:\"i586\", reference:\"wireshark-1.12.9-0.12.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-01-11T16:30:17", "description": "This update contains Wireshark 1.12.9 and fixes the following issues :\n\n - CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437)\n\n - CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.\n\n - CVE-2015-8712: The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.\n\n - CVE-2015-8714: The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.\n\n - CVE-2015-8716: The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8717: The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8718: Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets for async NLM' option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8719: The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8720: The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.\n\n - CVE-2015-8721: Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.\n\n - CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.\n\n - CVE-2015-8723: The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted\n\n - CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.\n\n - CVE-2015-8725: The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.\n\n - CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.\n\n - CVE-2015-8727: The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.\n\n - CVE-2015-8728: The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.\n\n - CVE-2015-8729: The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.\n\n - CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.\n\n - CVE-2015-8731: The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.\n\n - CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.\n\n - CVE-2015-8733: The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2016-01-14T00:00:00", "type": "nessus", "title": "SUSE SLED12 / SLES12 Security Update : wireshark (SUSE-SU-2016:0109-1)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7830", "CVE-2015-8711", "CVE-2015-8712", "CVE-2015-8713", "CVE-2015-8714", "CVE-2015-8715", "CVE-2015-8716", "CVE-2015-8717", "CVE-2015-8718", "CVE-2015-8719", "CVE-2015-8720", "CVE-2015-8721", "CVE-2015-8722", "CVE-2015-8723", "CVE-2015-8724", "CVE-2015-8725", "CVE-2015-8726", "CVE-2015-8727", "CVE-2015-8728", "CVE-2015-8729", "CVE-2015-8730", "CVE-2015-8731", "CVE-2015-8732", "CVE-2015-8733"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:wireshark", "p-cpe:/a:novell:suse_linux:wireshark-debuginfo", "p-cpe:/a:novell:suse_linux:wireshark-debugsource", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2016-0109-1.NASL", "href": "https://www.tenable.com/plugins/nessus/87911", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2016:0109-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(87911);\n script_version(\"2.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2015-7830\", \"CVE-2015-8711\", \"CVE-2015-8712\", \"CVE-2015-8713\", \"CVE-2015-8714\", \"CVE-2015-8715\", \"CVE-2015-8716\", \"CVE-2015-8717\", \"CVE-2015-8718\", \"CVE-2015-8719\", \"CVE-2015-8720\", \"CVE-2015-8721\", \"CVE-2015-8722\", \"CVE-2015-8723\", \"CVE-2015-8724\", \"CVE-2015-8725\", \"CVE-2015-8726\", \"CVE-2015-8727\", \"CVE-2015-8728\", \"CVE-2015-8729\", \"CVE-2015-8730\", \"CVE-2015-8731\", \"CVE-2015-8732\", \"CVE-2015-8733\");\n\n script_name(english:\"SUSE SLED12 / SLES12 Security Update : wireshark (SUSE-SU-2016:0109-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update contains Wireshark 1.12.9 and fixes the following issues :\n\n - CVE-2015-7830: pcapng file parser could crash while\n copying an interface filter (bsc#950437)\n\n - CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not validate conversation data, which\n allows remote attackers to cause a denial of service\n (NULL pointer dereference and application crash) via a\n crafted packet.\n\n - CVE-2015-8712: The dissect_hsdsch_channel_info function\n in epan/dissectors/packet-umts_fp.c in the UMTS FP\n dissector in Wireshark 1.12.x before 1.12.9 does not\n validate the number of PDUs, which allows remote\n attackers to cause a denial of service (application\n crash) via a crafted packet.\n\n - CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the\n UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does\n not properly reserve memory for channel ID mappings,\n which allows remote attackers to cause a denial of\n service (out-of-bounds memory access and application\n crash) via a crafted packet.\n\n - CVE-2015-8714: The dissect_dcom_OBJREF function in\n epan/dissectors/packet-dcom.c in the DCOM dissector in\n Wireshark 1.12.x before 1.12.9 does not initialize a\n certain IPv4 data structure, which allows remote\n attackers to cause a denial of service (application\n crash) via a crafted packet.\n\n - CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the\n AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does\n not check for empty arguments, which allows remote\n attackers to cause a denial of service (infinite loop)\n via a crafted packet.\n\n - CVE-2015-8716: The init_t38_info_conv function in\n epan/dissectors/packet-t38.c in the T.38 dissector in\n Wireshark 1.12.x before 1.12.9 does not ensure that a\n conversation exists, which allows remote attackers to\n cause a denial of service (application crash) via a\n crafted packet.\n\n - CVE-2015-8717: The dissect_sdp function in\n epan/dissectors/packet-sdp.c in the SDP dissector in\n Wireshark 1.12.x before 1.12.9 does not prevent use of a\n negative media count, which allows remote attackers to\n cause a denial of service (application crash) via a\n crafted packet.\n\n - CVE-2015-8718: Double free vulnerability in\n epan/dissectors/packet-nlm.c in the NLM dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1,\n when the 'Match MSG/RES packets for async NLM' option is\n enabled, allows remote attackers to cause a denial of\n service (application crash) via a crafted packet.\n\n - CVE-2015-8719: The dissect_dns_answer function in\n epan/dissectors/packet-dns.c in the DNS dissector in\n Wireshark 1.12.x before 1.12.9 mishandles the EDNS0\n Client Subnet option, which allows remote attackers to\n cause a denial of service (application crash) via a\n crafted packet.\n\n - CVE-2015-8720: The dissect_ber_GeneralizedTime function\n in epan/dissectors/packet-ber.c in the BER dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n improperly checks an sscanf return value, which allows\n remote attackers to cause a denial of service\n (application crash) via a crafted packet.\n\n - CVE-2015-8721: Buffer overflow in the tvb_uncompress\n function in epan/tvbuff_zlib.c in Wireshark 1.12.x\n before 1.12.9 and 2.0.x before 2.0.1 allows remote\n attackers to cause a denial of service (application\n crash) via a crafted packet with zlib compression.\n\n - CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not validate the frame pointer, which\n allows remote attackers to cause a denial of service\n (NULL pointer dereference and application crash) via a\n crafted packet.\n\n - CVE-2015-8723: The AirPDcapPacketProcess function in\n epan/crypt/airpdcap.c in the 802.11 dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n does not validate the relationship between the total\n length and the capture length, which allows remote\n attackers to cause a denial of service (stack-based\n buffer overflow and application crash) via a crafted\n\n - CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey\n function in epan/crypt/airpdcap.c in the 802.11\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not verify the WPA broadcast key\n length, which allows remote attackers to cause a denial\n of service (out-of-bounds read and application crash)\n via a crafted packet.\n\n - CVE-2015-8725: The\n dissect_diameter_base_framed_ipv6_prefix function in\n epan/dissectors/packet-diameter.c in the DIAMETER\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not validate the IPv6 prefix length,\n which allows remote attackers to cause a denial of\n service (stack-based buffer overflow and application\n crash) via a crafted packet.\n\n - CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser\n in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n does not validate certain signature and Modulation and\n Coding Scheme (MCS) data, which allows remote attackers\n to cause a denial of service (out-of-bounds read and\n application crash) via a crafted file.\n\n - CVE-2015-8727: The dissect_rsvp_common function in\n epan/dissectors/packet-rsvp.c in the RSVP dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n does not properly maintain request-key data, which\n allows remote attackers to cause a denial of service\n (use-after-free and application crash) via a crafted\n packet.\n\n - CVE-2015-8728: The Mobile Identity parser in (1)\n epan/dissectors/packet-ansi_a.c in the ANSI A dissector\n and (2) epan/dissectors/packet-gsm_a_common.c in the GSM\n A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 improperly uses the\n tvb_bcd_dig_to_wmem_packet_str function, which allows\n remote attackers to cause a denial of service (buffer\n overflow and application crash) via a crafted packet.\n\n - CVE-2015-8729: The ascend_seek function in\n wiretap/ascendtext.c in the Ascend file parser in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n does not ensure the presence of a '\\0' character at the\n end of a date string, which allows remote attackers to\n cause a denial of service (out-of-bounds read and\n application crash) via a crafted file.\n\n - CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP\n dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x\n before 2.0.1 does not validate the number of items,\n which allows remote attackers to cause a denial of\n service (invalid read operation and application crash)\n via a crafted packet.\n\n - CVE-2015-8731: The dissct_rsl_ipaccess_msg function in\n epan/dissectors/packet-rsl.c in the RSL dissector in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n does not reject unknown TLV types, which allows remote\n attackers to cause a denial of service (out-of-bounds\n read and application crash) via a crafted packet.\n\n - CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp\n function in epan/dissectors/packet-zbee-zcl-general.c in\n the ZigBee ZCL dissector in Wireshark 1.12.x before\n 1.12.9 and 2.0.x before 2.0.1 does not validate the\n Total Profile Number field, which allows remote\n attackers to cause a denial of service (out-of-bounds\n read and application crash) via a crafted packet.\n\n - CVE-2015-8733: The ngsniffer_process_record function in\n wiretap/ngsniffer.c in the Sniffer file parser in\n Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1\n does not validate the relationships between record\n lengths and record header lengths, which allows remote\n attackers to cause a denial of service (out-of-bounds\n read and application crash) via a crafted file.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=950437\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=960382\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7830/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8711/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8712/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8713/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8714/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8715/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8716/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8717/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8718/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8719/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8720/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8721/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8722/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8723/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8724/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8725/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8726/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8727/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8728/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8729/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8730/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8731/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8732/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8733/\"\n );\n # https://www.suse.com/support/update/announcement/2016/suse-su-20160109-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3c2a469e\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 12-SP1 :\n\nzypper in -t patch SUSE-SLE-SDK-12-SP1-2016-76=1\n\nSUSE Linux Enterprise Software Development Kit 12 :\n\nzypper in -t patch SUSE-SLE-SDK-12-2016-76=1\n\nSUSE Linux Enterprise Server 12-SP1 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-76=1\n\nSUSE Linux Enterprise Server 12 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-2016-76=1\n\nSUSE Linux Enterprise Desktop 12-SP1 :\n\nzypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-76=1\n\nSUSE Linux Enterprise Desktop 12 :\n\nzypper in -t patch SUSE-SLE-DESKTOP-12-2016-76=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/01/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/01/14\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED12|SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED12 / SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(0|1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP0/1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED12\" && (! preg(pattern:\"^(0|1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED12 SP0/1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"wireshark-1.12.9-22.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"wireshark-debuginfo-1.12.9-22.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"wireshark-debugsource-1.12.9-22.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", reference:\"wireshark-1.12.9-22.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", reference:\"wireshark-debuginfo-1.12.9-22.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", reference:\"wireshark-debugsource-1.12.9-22.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"wireshark-1.12.9-22.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"wireshark-debuginfo-1.12.9-22.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"wireshark-debugsource-1.12.9-22.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"wireshark-1.12.9-22.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"wireshark-debuginfo-1.12.9-22.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"wireshark-debugsource-1.12.9-22.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-01-11T16:33:40", "description": "Multiple vulnerabilities were discovered in the dissectors/parsers for Pcapng, NBAP, UMTS FP, DCOM, AllJoyn, T.38, SDP, NLM, DNS, BED, SCTP, 802.11, DIAMETER, VeriWave, RVSP, ANSi A, GSM A, Ascend, NBAP, ZigBee ZCL and Sniffer which could result in denial of service.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2016-03-07T00:00:00", "type": "nessus", "title": "Debian DSA-3505-1 : wireshark - security update", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7830", "CVE-2015-8711", "CVE-2015-8712", "CVE-2015-8713", "CVE-2015-8714", "CVE-2015-8715", "CVE-2015-8716", "CVE-2015-8717", "CVE-2015-8718", "CVE-2015-8719", "CVE-2015-8720", "CVE-2015-8721", "CVE-2015-8722", "CVE-2015-8723", "CVE-2015-8724", "CVE-2015-8725", "CVE-2015-8726", "CVE-2015-8727", "CVE-2015-8728", "CVE-2015-8729", "CVE-2015-8730", "CVE-2015-8732", "CVE-2015-8733"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:wireshark", "cpe:/o:debian:debian_linux:7.0", "cpe:/o:debian:debian_linux:8.0"], "id": "DEBIAN_DSA-3505.NASL", "href": "https://www.tenable.com/plugins/nessus/89695", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3505. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(89695);\n script_version(\"2.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-7830\", \"CVE-2015-8711\", \"CVE-2015-8712\", \"CVE-2015-8713\", \"CVE-2015-8714\", \"CVE-2015-8715\", \"CVE-2015-8716\", \"CVE-2015-8717\", \"CVE-2015-8718\", \"CVE-2015-8719\", \"CVE-2015-8720\", \"CVE-2015-8721\", \"CVE-2015-8722\", \"CVE-2015-8723\", \"CVE-2015-8724\", \"CVE-2015-8725\", \"CVE-2015-8726\", \"CVE-2015-8727\", \"CVE-2015-8728\", \"CVE-2015-8729\", \"CVE-2015-8730\", \"CVE-2015-8732\", \"CVE-2015-8733\");\n script_xref(name:\"DSA\", value:\"3505\");\n\n script_name(english:\"Debian DSA-3505-1 : wireshark - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities were discovered in the dissectors/parsers for\nPcapng, NBAP, UMTS FP, DCOM, AllJoyn, T.38, SDP, NLM, DNS, BED, SCTP,\n802.11, DIAMETER, VeriWave, RVSP, ANSi A, GSM A, Ascend, NBAP, ZigBee\nZCL and Sniffer which could result in denial of service.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/wireshark\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/wireshark\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2016/dsa-3505\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the wireshark packages.\n\nFor the oldstable distribution (wheezy), these problems have been\nfixed in version 1.8.2-5wheezy17.\n\nFor the stable distribution (jessie), these problems have been fixed\nin version 1.12.1+g01b65bf-4+deb8u4.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/03/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/03/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark-data\", reference:\"1.8.2-5wheezy17\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark-dev\", reference:\"1.8.2-5wheezy17\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark2\", reference:\"1.8.2-5wheezy17\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwiretap-dev\", reference:\"1.8.2-5wheezy17\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwiretap2\", reference:\"1.8.2-5wheezy17\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwsutil-dev\", reference:\"1.8.2-5wheezy17\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwsutil2\", reference:\"1.8.2-5wheezy17\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"tshark\", reference:\"1.8.2-5wheezy17\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark\", reference:\"1.8.2-5wheezy17\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-common\", reference:\"1.8.2-5wheezy17\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-dbg\", reference:\"1.8.2-5wheezy17\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-dev\", reference:\"1.8.2-5wheezy17\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-doc\", reference:\"1.8.2-5wheezy17\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark-data\", reference:\"1.12.1+g01b65bf-4+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark5\", reference:\"1.12.1+g01b65bf-4+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwiretap-dev\", reference:\"1.12.1+g01b65bf-4+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwiretap4\", reference:\"1.12.1+g01b65bf-4+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwsutil-dev\", reference:\"1.12.1+g01b65bf-4+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwsutil4\", reference:\"1.12.1+g01b65bf-4+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"tshark\", reference:\"1.12.1+g01b65bf-4+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark\", reference:\"1.12.1+g01b65bf-4+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-common\", reference:\"1.12.1+g01b65bf-4+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-dbg\", reference:\"1.12.1+g01b65bf-4+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-doc\", reference:\"1.12.1+g01b65bf-4+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-qt\", reference:\"1.12.1+g01b65bf-4+deb8u4\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-01-11T16:33:52", "description": "The version of Wireshark installed on the remote Mac OS X host is 1.12.x prior to 1.12.10. It is, therefore, affected by multiple vulnerabilities in the following components, which can result in a memory disclosure or a denial of service :\n\n - ASN.1 BER dissector\n - DNP dissector\n - GSM A-bis OML dissector\n - LLRP dissector\n - RSL dissector\n\nAdditionally, a flaw related to how dynamic-link library (DLL) files are located and loaded exists in the ui/qt/wireshark_application.cpp file due to the application using a DLL search path that may include directories that are not trusted or under the user's control. A local attacker can exploit this issue, via a crafted DLL file injected into the search path, to execute arbitrary code with the privileges of the user running the application.\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2016-03-03T00:00:00", "type": "nessus", "title": "Wireshark 1.12.x < 1.12.10 Multiple Vulnerabilities (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-2521", "CVE-2016-2523", "CVE-2016-2531", "CVE-2016-2532"], "modified": "2019-11-20T00:00:00", "cpe": ["cpe:/a:wireshark:wireshark"], "id": "MACOSX_WIRESHARK_1_12_10.NASL", "href": "https://www.tenable.com/plugins/nessus/89101", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(89101);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/11/20\");\n\n script_cve_id(\n \"CVE-2016-2521\",\n \"CVE-2016-2523\",\n \"CVE-2016-2531\",\n \"CVE-2016-2532\"\n );\n script_xref(name:\"EDB-ID\", value:\"38996\");\n\n script_name(english:\"Wireshark 1.12.x < 1.12.10 Multiple Vulnerabilities (Mac OS X)\");\n script_summary(english:\"Checks the version of Wireshark.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host has an application installed that is affected\nby multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Wireshark installed on the remote Mac OS X host is\n1.12.x prior to 1.12.10. It is, therefore, affected by multiple\nvulnerabilities in the following components, which can result in a\nmemory disclosure or a denial of service :\n\n - ASN.1 BER dissector\n - DNP dissector\n - GSM A-bis OML dissector\n - LLRP dissector\n - RSL dissector\n\nAdditionally, a flaw related to how dynamic-link library (DLL) files\nare located and loaded exists in the ui/qt/wireshark_application.cpp\nfile due to the application using a DLL search path that may include\ndirectories that are not trusted or under the user's control. A local\nattacker can exploit this issue, via a crafted DLL file injected into\nthe search path, to execute arbitrary code with the privileges of the\nuser running the application.\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Wireshark version 1.12.10 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-2521\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/12/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/02/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/03/03\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:wireshark:wireshark\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_wireshark_installed.nbin\");\n script_require_keys(\"installed_sw/Wireshark\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nget_kb_item_or_exit(\"Host/MacOSX/Version\");\n\napp_name = \"Wireshark\";\ninstall = get_single_install(app_name:app_name, exit_if_unknown_ver:TRUE);\nversion = install['version'];\npath = install['path'];\n\nfixed_version = \"1.12.10\";\n\n# Affected :\n# 1.12.x < 1.12.10\nif (version !~ \"^1\\.12\\.[0-9]($|[^0-9])\")\n audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);\n\nreport =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fixed_version +\n '\\n';\n\nsecurity_report_v4(port:0, severity:SECURITY_HOLE, extra:report);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-03-10T14:26:41", "description": "The version of Wireshark installed on the remote Windows host is 1.12.x prior to 1.12.10. It is, therefore, affected by multiple vulnerabilities in the following components, which can result in a memory disclosure or a denial of service :\n\n - ASN.1 BER dissector\n - DNP dissector\n - GSM A-bis OML dissector\n - LLRP dissector\n - RSL dissector\n\nAdditionally, a flaw related to how dynamic-link library (DLL) files are located and loaded exists in the ui/qt/wireshark_application.cpp file due to the application using a DLL search path that may include directories that are not trusted or under the user's control. A local attacker can exploit this issue, via a crafted DLL file injected into the search path, to execute arbitrary code with the privileges of the user running the application.\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2016-03-03T00:00:00", "type": "nessus", "title": "Wireshark 1.12.x < 1.12.10 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-2521", "CVE-2016-2523", "CVE-2016-2531", "CVE-2016-2532"], "modified": "2023-03-09T00:00:00", "cpe": ["cpe:/a:wireshark:wireshark"], "id": "WIRESHARK_1_12_10.NASL", "href": "https://www.tenable.com/plugins/nessus/89103", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(89103);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/03/09\");\n\n script_cve_id(\n \"CVE-2016-2521\",\n \"CVE-2016-2523\",\n \"CVE-2016-2531\",\n \"CVE-2016-2532\"\n );\n script_xref(name:\"EDB-ID\", value:\"38996\");\n\n script_name(english:\"Wireshark 1.12.x < 1.12.10 Multiple Vulnerabilities\");\n script_summary(english:\"Checks the version of Wireshark.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host has an application installed that is affected\nby multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Wireshark installed on the remote Windows host is\n1.12.x prior to 1.12.10. It is, therefore, affected by multiple\nvulnerabilities in the following components, which can result in a\nmemory disclosure or a denial of service :\n\n - ASN.1 BER dissector\n - DNP dissector\n - GSM A-bis OML dissector\n - LLRP dissector\n - RSL dissector\n\nAdditionally, a flaw related to how dynamic-link library (DLL) files\nare located and loaded exists in the ui/qt/wireshark_application.cpp\nfile due to the application using a DLL search path that may include\ndirectories that are not trusted or under the user's control. A local\nattacker can exploit this issue, via a crafted DLL file injected into\nthe search path, to execute arbitrary code with the privileges of the\nuser running the application.\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Wireshark version 1.12.10 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-2521\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/12/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/02/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/03/03\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:wireshark:wireshark\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"wireshark_installed.nasl\");\n script_require_keys(\"installed_sw/Wireshark\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\nget_kb_item_or_exit('SMB/Registry/Enumerated');\n\nvar app_info = vcf::get_app_info(app:'Wireshark', win_local:TRUE);\n\nvar constraints = [\n { 'min_version' : '1.12.0', 'max_version' : '1.12.9', 'fixed_version' : '1.12.10' }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);\n\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-25T14:40:42", "description": "According to the versions of the wireshark packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by correcting the extraction of the length value.(CVE-2018-7418)\n\n - In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the DCERPC SPOOLSS dissector could crash. This was addressed in epan/dissectors/packet-dcerpc-spoolss.c by adding a boundary check.(CVE-2019-10903)\n\n - In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the GSS-API dissector could crash. This was addressed in epan/dissectors/packet-gssapi.c by ensuring that a valid dissector is called.(CVE-2019-10894)\n\n - In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by handling file digests properly.(CVE-2019-10901)\n\n - In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the NetScaler file parser could crash. This was addressed in wiretap/netscaler.c by improving data validation.(CVE-2019-10895)\n\n - In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the SRVLOC dissector could crash. This was addressed in epan/dissectors/packet-srvloc.c by preventing a heap-based buffer under-read.(CVE-2019-10899)\n\n - In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB dissectors could crash.\n This was addressed in epan/tvbparse.c by limiting the recursion depth.(CVE-2018-5336)\n\n - In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.(CVE-2018-14340)\n\n - In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that are too long.(CVE-2018-14368)\n\n - In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.(CVE-2018-14341)\n\n - In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Radiotap dissector could crash. This was addressed in epan/dissectors/packet-ieee80211-radiotap-iter.c by validating iterator operations.(CVE-2018-16057)\n\n - In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the MMSE dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-mmse.c by preventing length overflows.(CVE-2018-19622)\n\n - In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by avoiding a buffer over-read upon encountering a missing '\\0' character.(CVE-2018-11362)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2021-04-30T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP3 : wireshark (EulerOS-SA-2021-1859)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-11362", "CVE-2018-14340", "CVE-2018-14341", "CVE-2018-14368", "CVE-2018-16057", "CVE-2018-19622", "CVE-2018-5336", "CVE-2018-7418", "CVE-2019-10894", "CVE-2019-10895", "CVE-2019-10899", "CVE-2019-10901", "CVE-2019-10903"], "modified": "2021-05-04T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:wireshark", "p-cpe:/a:huawei:euleros:wireshark-gnome", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2021-1859.NASL", "href": "https://www.tenable.com/plugins/nessus/149199", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149199);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/05/04\");\n\n script_cve_id(\n \"CVE-2018-11362\",\n \"CVE-2018-14340\",\n \"CVE-2018-14341\",\n \"CVE-2018-14368\",\n \"CVE-2018-16057\",\n \"CVE-2018-19622\",\n \"CVE-2018-5336\",\n \"CVE-2018-7418\",\n \"CVE-2019-10894\",\n \"CVE-2019-10895\",\n \"CVE-2019-10899\",\n \"CVE-2019-10901\",\n \"CVE-2019-10903\"\n );\n\n script_name(english:\"EulerOS 2.0 SP3 : wireshark (EulerOS-SA-2021-1859)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the wireshark packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the\n SIGCOMP dissector could crash. This was addressed in\n epan/dissectors/packet-sigcomp.c by correcting the\n extraction of the length value.(CVE-2018-7418)\n\n - In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and\n 3.0.0, the DCERPC SPOOLSS dissector could crash. This\n was addressed in\n epan/dissectors/packet-dcerpc-spoolss.c by adding a\n boundary check.(CVE-2019-10903)\n\n - In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and\n 3.0.0, the GSS-API dissector could crash. This was\n addressed in epan/dissectors/packet-gssapi.c by\n ensuring that a valid dissector is\n called.(CVE-2019-10894)\n\n - In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and\n 3.0.0, the LDSS dissector could crash. This was\n addressed in epan/dissectors/packet-ldss.c by handling\n file digests properly.(CVE-2019-10901)\n\n - In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and\n 3.0.0, the NetScaler file parser could crash. This was\n addressed in wiretap/netscaler.c by improving data\n validation.(CVE-2019-10895)\n\n - In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and\n 3.0.0, the SRVLOC dissector could crash. This was\n addressed in epan/dissectors/packet-srvloc.c by\n preventing a heap-based buffer\n under-read.(CVE-2019-10899)\n\n - In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the\n JSON, XML, NTP, XMPP, and GDB dissectors could crash.\n This was addressed in epan/tvbparse.c by limiting the\n recursion depth.(CVE-2018-5336)\n\n - In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0\n to 2.2.15, dissectors that support zlib decompression\n could crash. This was addressed in epan/tvbuff_zlib.c\n by rejecting negative lengths to avoid a buffer\n over-read.(CVE-2018-14340)\n\n - In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0\n to 2.2.15, the Bazaar protocol dissector could go into\n an infinite loop. This was addressed in\n epan/dissectors/packet-bzr.c by properly handling items\n that are too long.(CVE-2018-14368)\n\n - In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0\n to 2.2.15, the DICOM dissector could go into a large or\n infinite loop. This was addressed in\n epan/dissectors/packet-dcm.c by preventing an offset\n overflow.(CVE-2018-14341)\n\n - In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0\n to 2.2.16, the Radiotap dissector could crash. This was\n addressed in\n epan/dissectors/packet-ieee80211-radiotap-iter.c by\n validating iterator operations.(CVE-2018-16057)\n\n - In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the\n MMSE dissector could go into an infinite loop. This was\n addressed in epan/dissectors/packet-mmse.c by\n preventing length overflows.(CVE-2018-19622)\n\n - In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to\n 2.2.14, the LDSS dissector could crash. This was\n addressed in epan/dissectors/packet-ldss.c by avoiding\n a buffer over-read upon encountering a missing '\\0'\n character.(CVE-2018-11362)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-1859\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?2025aba1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected wireshark packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/04/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/04/30\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:wireshark-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(3)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"wireshark-1.10.14-7.h4\",\n \"wireshark-gnome-1.10.14-7.h4\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"3\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-01-26T14:20:08", "description": "Wireshark was updated to 1.12.13 to fix a number of minor security issues and bugs.\n\nThis release fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file.\n\n - CVE-2016-6504: NDS dissector crash (boo#991012)\n\n - CVE-2016-6505: PacketBB crash (boo#991013)\n\n - CVE-2016-6506: WSP infinite loop (boo#991015)\n\n - CVE-2016-6507: MMSE infinite loop (boo#991016)\n\n - CVE-2016-6508: RLC long loop (boo#991017)\n\n - CVE-2016-6509: LDSS dissector crash (boo#991018)\n\n - CVE-2016-6510: RLC dissector crash (boo#991019)\n\n - CVE-2016-6511: OpenFlow long loop (boo#991020)\n\nThis update also includes further bug fixes and updated protocol support as listed in:\nhttps://www.wireshark.org/docs/relnotes/wireshark-1.12.13.html", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-08-08T00:00:00", "type": "nessus", "title": "openSUSE Security Update : wireshark (openSUSE-2016-947)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-6504", "CVE-2016-6505", "CVE-2016-6506", "CVE-2016-6507", "CVE-2016-6508", "CVE-2016-6509", "CVE-2016-6510", "CVE-2016-6511"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:wireshark", "p-cpe:/a:novell:opensuse:wireshark-debuginfo", "p-cpe:/a:novell:opensuse:wireshark-debugsource", "p-cpe:/a:novell:opensuse:wireshark-devel", "p-cpe:/a:novell:opensuse:wireshark-ui-gtk", "p-cpe:/a:novell:opensuse:wireshark-ui-gtk-debuginfo", "p-cpe:/a:novell:opensuse:wireshark-ui-qt", "p-cpe:/a:novell:opensuse:wireshark-ui-qt-debuginfo", "cpe:/o:novell:opensuse:13.2", "cpe:/o:novell:opensuse:42.1"], "id": "OPENSUSE-2016-947.NASL", "href": "https://www.tenable.com/plugins/nessus/92777", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2016-947.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(92777);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2016-6504\", \"CVE-2016-6505\", \"CVE-2016-6506\", \"CVE-2016-6507\", \"CVE-2016-6508\", \"CVE-2016-6509\", \"CVE-2016-6510\", \"CVE-2016-6511\");\n\n script_name(english:\"openSUSE Security Update : wireshark (openSUSE-2016-947)\");\n script_summary(english:\"Check for the openSUSE-2016-947 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Wireshark was updated to 1.12.13 to fix a number of minor security\nissues and bugs.\n\nThis release fixes a number issues in protocol dissectors that could\nhave allowed a remote attacker to crash Wireshark or cause excessive\nCPU usage through specially crafted packages inserted into the network\nor a capture file.\n\n - CVE-2016-6504: NDS dissector crash (boo#991012)\n\n - CVE-2016-6505: PacketBB crash (boo#991013)\n\n - CVE-2016-6506: WSP infinite loop (boo#991015)\n\n - CVE-2016-6507: MMSE infinite loop (boo#991016)\n\n - CVE-2016-6508: RLC long loop (boo#991017)\n\n - CVE-2016-6509: LDSS dissector crash (boo#991018)\n\n - CVE-2016-6510: RLC dissector crash (boo#991019)\n\n - CVE-2016-6511: OpenFlow long loop (boo#991020)\n\nThis update also includes further bug fixes and updated protocol\nsupport as listed in:\nhttps://www.wireshark.org/docs/relnotes/wireshark-1.12.13.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=991012\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=991013\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=991015\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=991016\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=991017\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=991018\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=991019\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=991020\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.13.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected wireshark packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-gtk-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-qt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/08/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/08/08\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.2|SUSE42\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.2 / 42.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-1.12.13-44.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-debuginfo-1.12.13-44.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-debugsource-1.12.13-44.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-devel-1.12.13-44.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-ui-gtk-1.12.13-44.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-ui-gtk-debuginfo-1.12.13-44.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-ui-qt-1.12.13-44.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"wireshark-ui-qt-debuginfo-1.12.13-44.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-1.12.13-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-debuginfo-1.12.13-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-debugsource-1.12.13-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-devel-1.12.13-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-ui-gtk-1.12.13-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-ui-gtk-debuginfo-1.12.13-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-ui-qt-1.12.13-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"wireshark-ui-qt-debuginfo-1.12.13-29.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark / wireshark-debuginfo / wireshark-debugsource / etc\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-01-26T14:20:38", "description": "The version of Wireshark installed on the remote Windows host is 1.12.x prior to 1.12.13. It is, therefore, affected by multiple denial of service vulnerabilities :\n\n - A NULL pointer dereference flaw exists in the dissect_nds_request() function in packet-ncp2222.inc due to improper handling of packets. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause an application crash. (CVE-2016-6504)\n\n - A denial of service vulnerability exists due to a divide-by-zero flaw in the dissect_pbb_tlvblock() function in packet-packetbb.c. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause an application crash. (CVE-2016-6505)\n\n - A flaw exists in the add_headers() function in packet_wsp.c that is triggered when an offset of zero is returned by the wkh_content_disposition() function. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause an infinite loop, resulting in a denial of service condition. (CVE-2016-6506)\n\n - A flaw exists in the tvb_get_guintvar() function in packet-mmse.c that is triggered during the handling of an overly large length value. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause an infinite loop, resulting in a denial of service condition.\n (CVE-2016-6507)\n\n - A denial of service vulnerability exists due to an incorrect integer data type used in the rlc_decode_li() function in packet-rlc.c. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a long loop and excessive CPU resource consumption, resulting in a denial of service condition. (CVE-2016-6508)\n\n - A denial of service vulnerability exists in the dissect_ldss_transfer() function in packet-ldss.c that is triggered when recreating a conversation that already exists. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause an application crash. (CVE-2016-6509)\n\n - An overflow condition exists in the rlc_decode_li() function in packet-rlc.c due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a stack-based buffer overflow, resulting in a denial of service condition.\n (CVE-2016-6510)\n\n - A denial of service vulnerability exists in the proto_tree_add_text_valist_internal() function in proto.c due to improper handling of packets. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a long loop and excessive CPU resource consumption.\n (CVE-2016-6511)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-08-09T00:00:00", "type": "nessus", "title": "Wireshark 1.12.x < 1.12.13 Multiple DoS", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-6504", "CVE-2016-6505", "CVE-2016-6506", "CVE-2016-6507", "CVE-2016-6508", "CVE-2016-6509", "CVE-2016-6510", "CVE-2016-6511"], "modified": "2019-11-14T00:00:00", "cpe": ["cpe:/a:wireshark:wireshark"], "id": "WIRESHARK_1_12_13.NASL", "href": "https://www.tenable.com/plugins/nessus/92816", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(92816);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/14\");\n\n script_cve_id(\n \"CVE-2016-6504\",\n \"CVE-2016-6505\",\n \"CVE-2016-6506\",\n \"CVE-2016-6507\",\n \"CVE-2016-6508\",\n \"CVE-2016-6509\",\n \"CVE-2016-6510\",\n \"CVE-2016-6511\"\n );\n script_bugtraq_id(\n 92163,\n 92164,\n 92165,\n 92166,\n 92167,\n 92168,\n 92169,\n 92173\n );\n script_xref(name:\"EDB-ID\", value:\"40194\");\n script_xref(name:\"EDB-ID\", value:\"40197\");\n script_xref(name:\"EDB-ID\", value:\"40198\");\n script_xref(name:\"EDB-ID\", value:\"40199\");\n\n script_name(english:\"Wireshark 1.12.x < 1.12.13 Multiple DoS\");\n script_summary(english:\"Checks the version of Wireshark.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host has an application installed that is affected\nby multiple denial of service vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Wireshark installed on the remote Windows host is\n1.12.x prior to 1.12.13. It is, therefore, affected by multiple denial\nof service vulnerabilities :\n\n - A NULL pointer dereference flaw exists in the\n dissect_nds_request() function in packet-ncp2222.inc due\n to improper handling of packets. An unauthenticated,\n remote attacker can exploit this, via a specially\n crafted packet or packet trace file, to cause an\n application crash. (CVE-2016-6504)\n\n - A denial of service vulnerability exists due to a\n divide-by-zero flaw in the dissect_pbb_tlvblock()\n function in packet-packetbb.c. An unauthenticated,\n remote attacker can exploit this, via a specially\n crafted packet or packet trace file, to cause an\n application crash. (CVE-2016-6505)\n\n - A flaw exists in the add_headers() function in\n packet_wsp.c that is triggered when an offset of zero is\n returned by the wkh_content_disposition() function. An\n unauthenticated, remote attacker can exploit this, via a \n specially crafted packet or packet trace file, to cause\n an infinite loop, resulting in a denial of service\n condition. (CVE-2016-6506)\n\n - A flaw exists in the tvb_get_guintvar() function in\n packet-mmse.c that is triggered during the handling of\n an overly large length value. An unauthenticated, remote\n attacker can exploit this, via a specially crafted\n packet or packet trace file, to cause an infinite loop,\n resulting in a denial of service condition.\n (CVE-2016-6507)\n\n - A denial of service vulnerability exists due to an\n incorrect integer data type used in the rlc_decode_li()\n function in packet-rlc.c. An unauthenticated, remote\n attacker can exploit this, via a specially crafted\n packet or packet trace file, to cause a long loop and\n excessive CPU resource consumption, resulting in a\n denial of service condition. (CVE-2016-6508)\n\n - A denial of service vulnerability exists in the\n dissect_ldss_transfer() function in packet-ldss.c that\n is triggered when recreating a conversation that already\n exists. An unauthenticated, remote attacker can exploit\n this, via a specially crafted packet or packet trace\n file, to cause an application crash. (CVE-2016-6509)\n\n - An overflow condition exists in the rlc_decode_li()\n function in packet-rlc.c due to improper validation of\n user-supplied input. An unauthenticated, remote attacker\n can exploit this, via a specially crafted packet or\n packet trace file, to cause a stack-based buffer\n overflow, resulting in a denial of service condition.\n (CVE-2016-6510)\n\n - A denial of service vulnerability exists in the\n proto_tree_add_text_valist_internal() function in\n proto.c due to improper handling of packets. An\n unauthenticated, remote attacker can exploit this, via a\n specially crafted packet or packet trace file, to cause\n a long loop and excessive CPU resource consumption.\n (CVE-2016-6511)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-40.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-41.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-42.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-43.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-44.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-45.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-46.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-47.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.13.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Wireshark version 1.12.13 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-6511\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/07/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/07/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:wireshark:wireshark\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"wireshark_installed.nasl\");\n script_require_keys(\"installed_sw/Wireshark\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\n\napp_name = \"Wireshark\";\ninstall = get_single_install(app_name:app_name, exit_if_unknown_ver:TRUE);\nversion = install['version'];\npath = install['path'];\nfix = '1.12.13';\n\nif(version !~ \"^1\\.12\\.\")\n exit(0, \"The remote installation of Wireshark is not 1.12.x.\");\n\n# Affected :\n# 1.12.x < 1.12.13\nif (version !~ \"^1\\.12\\.([0-9]|1[0-2])($|[^0-9])\")\n audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);\n\nport = get_kb_item(\"SMB/transport\");\nif (!port) port = 445;\n\nreport =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n\nsecurity_report_v4(port:port, severity:SECURITY_WARNING, extra:report);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-01-17T14:23:24", "description": "Multiple vulnerabilities were discovered in the dissectors for NDS, PacketBB, WSP, MMSE, RLC, LDSS, RLC and OpenFlow, which could result in denial of service or the execution of arbitrary code.", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-08-15T00:00:00", "type": "nessus", "title": "Debian DSA-3648-1 : wireshark - security update", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-6504", "CVE-2016-6505", "CVE-2016-6506", "CVE-2016-6507", "CVE-2016-6508", "CVE-2016-6509", "CVE-2016-6510", "CVE-2016-6511"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:wireshark", "cpe:/o:debian:debian_linux:8.0"], "id": "DEBIAN_DSA-3648.NASL", "href": "https://www.tenable.com/plugins/nessus/92958", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3648. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(92958);\n script_version(\"2.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-6504\", \"CVE-2016-6505\", \"CVE-2016-6506\", \"CVE-2016-6507\", \"CVE-2016-6508\", \"CVE-2016-6509\", \"CVE-2016-6510\", \"CVE-2016-6511\");\n script_xref(name:\"DSA\", value:\"3648\");\n\n script_name(english:\"Debian DSA-3648-1 : wireshark - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities were discovered in the dissectors for NDS,\nPacketBB, WSP, MMSE, RLC, LDSS, RLC and OpenFlow, which could result\nin denial of service or the execution of arbitrary code.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/wireshark\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2016/dsa-3648\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the wireshark packages.\n\nFor the stable distribution (jessie), these problems have been fixed\nin version 1.12.1+g01b65bf-4+deb8u8.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/08/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/08/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark-data\", reference:\"1.12.1+g01b65bf-4+deb8u8\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u8\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark5\", reference:\"1.12.1+g01b65bf-4+deb8u8\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwiretap-dev\", reference:\"1.12.1+g01b65bf-4+deb8u8\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwiretap4\", reference:\"1.12.1+g01b65bf-4+deb8u8\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwsutil-dev\", reference:\"1.12.1+g01b65bf-4+deb8u8\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwsutil4\", reference:\"1.12.1+g01b65bf-4+deb8u8\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"tshark\", reference:\"1.12.1+g01b65bf-4+deb8u8\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark\", reference:\"1.12.1+g01b65bf-4+deb8u8\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-common\", reference:\"1.12.1+g01b65bf-4+deb8u8\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-dbg\", reference:\"1.12.1+g01b65bf-4+deb8u8\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u8\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-doc\", reference:\"1.12.1+g01b65bf-4+deb8u8\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-qt\", reference:\"1.12.1+g01b65bf-4+deb8u8\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T12:41:02", "description": "Multiple vulnerabilities were discovered in the dissectors for NDS, PacketBB, WSP, MMSE, RLC, LDSS, RLC and OpenFlow, which could result in denial of service or the execution of arbitrary code.\n\nFor Debian 7 'Wheezy', these problems have been fixed in version 1.12.1+g01b65bf-4+deb8u6~deb7u3.\n\nWe recommend that you upgrade your wireshark packages.\n\nNOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2016-08-16T00:00:00", "type": "nessus", "title": "Debian DLA-595-1 : wireshark security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-6504", "CVE-2016-6505", "CVE-2016-6506", "CVE-2016-6507", "CVE-2016-6508", "CVE-2016-6509", "CVE-2016-6510", "CVE-2016-6511"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:libwireshark-data", "p-cpe:/a:debian:debian_linux:libwireshark-dev", "p-cpe:/a:debian:debian_linux:libwireshark2", "p-cpe:/a:debian:debian_linux:libwiretap-dev", "p-cpe:/a:debian:debian_linux:libwiretap2", "p-cpe:/a:debian:debian_linux:libwsutil-dev", "p-cpe:/a:debian:debian_linux:libwsutil2", "p-cpe:/a:debian:debian_linux:tshark", "p-cpe:/a:debian:debian_linux:wireshark", "p-cpe:/a:debian:debian_linux:wireshark-common", "p-cpe:/a:debian:debian_linux:wireshark-dbg", "p-cpe:/a:debian:debian_linux:wireshark-dev", "p-cpe:/a:debian:debian_linux:wireshark-doc", "cpe:/o:debian:debian_linux:7.0"], "id": "DEBIAN_DLA-595.NASL", "href": "https://www.tenable.com/plugins/nessus/92969", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-595-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(92969);\n script_version(\"2.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-6504\", \"CVE-2016-6505\", \"CVE-2016-6506\", \"CVE-2016-6507\", \"CVE-2016-6508\", \"CVE-2016-6509\", \"CVE-2016-6510\", \"CVE-2016-6511\");\n\n script_name(english:\"Debian DLA-595-1 : wireshark security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities were discovered in the dissectors for NDS,\nPacketBB, WSP, MMSE, RLC, LDSS, RLC and OpenFlow, which could result\nin denial of service or the execution of arbitrary code.\n\nFor Debian 7 'Wheezy', these problems have been fixed in version\n1.12.1+g01b65bf-4+deb8u6~deb7u3.\n\nWe recommend that you upgrade your wireshark packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2016/08/msg00020.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/wireshark\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwireshark-data\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwireshark-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwireshark2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwiretap-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwiretap2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwsutil-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwsutil2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:tshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/08/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/08/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark-data\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark2\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwiretap-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwiretap2\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwsutil-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwsutil2\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"tshark\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-common\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-dbg\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-doc\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-01-11T16:36:48", "description": "The remote host is affected by the vulnerability described in GLSA-201604-05 (Wireshark: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Wireshark. Please review the CVE identifiers referenced below for details.\n Impact :\n\n Remote attackers could cause Denial of Service and local attackers could escalate privileges.\n Workaround :\n\n There is no known workaround at this time.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2016-04-27T00:00:00", "type": "nessus", "title": "GLSA-201604-05 : Wireshark: Multiple vulnerabilities", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-8711", "CVE-2015-8712", "CVE-2015-8713", "CVE-2015-8714", "CVE-2015-8715", "CVE-2015-8716", "CVE-2015-8717", "CVE-2015-8718", "CVE-2015-8719", "CVE-2015-8720", "CVE-2015-8721", "CVE-2015-8722", "CVE-2015-8723", "CVE-2015-8724", "CVE-2015-8725", "CVE-2015-8726", "CVE-2015-8727", "CVE-2015-8728", "CVE-2015-8729", "CVE-2015-8730", "CVE-2015-8731", "CVE-2015-8732", "CVE-2015-8733", "CVE-2015-8734", "CVE-2015-8735", "CVE-2015-8736", "CVE-2015-8737", "CVE-2015-8738", "CVE-2015-8739", "CVE-2015-8740", "CVE-2015-8741", "CVE-2015-8742", "CVE-2016-2521", "CVE-2016-2522", "CVE-2016-2523", "CVE-2016-2524", "CVE-2016-2525", "CVE-2016-2526", "CVE-2016-2527", "CVE-2016-2528", "CVE-2016-2529", "CVE-2016-2530", "CVE-2016-2531", "CVE-2016-2532"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:wireshark", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-201604-05.NASL", "href": "https://www.tenable.com/plugins/nessus/90744", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201604-05.\n#\n# The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(90744);\n script_version(\"2.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-8711\", \"CVE-2015-8712\", \"CVE-2015-8713\", \"CVE-2015-8714\", \"CVE-2015-8715\", \"CVE-2015-8716\", \"CVE-2015-8717\", \"CVE-2015-8718\", \"CVE-2015-8719\", \"CVE-2015-8720\", \"CVE-2015-8721\", \"CVE-2015-8722\", \"CVE-2015-8723\", \"CVE-2015-8724\", \"CVE-2015-8725\", \"CVE-2015-8726\", \"CVE-2015-8727\", \"CVE-2015-8728\", \"CVE-2015-8729\", \"CVE-2015-8730\", \"CVE-2015-8731\", \"CVE-2015-8732\", \"CVE-2015-8733\", \"CVE-2015-8734\", \"CVE-2015-8735\", \"CVE-2015-8736\", \"CVE-2015-8737\", \"CVE-2015-8738\", \"CVE-2015-8739\", \"CVE-2015-8740\", \"CVE-2015-8741\", \"CVE-2015-8742\", \"CVE-2016-2521\", \"CVE-2016-2522\", \"CVE-2016-2523\", \"CVE-2016-2524\", \"CVE-2016-2525\", \"CVE-2016-2526\", \"CVE-2016-2527\", \"CVE-2016-2528\", \"CVE-2016-2529\", \"CVE-2016-2530\", \"CVE-2016-2531\", \"CVE-2016-2532\");\n script_xref(name:\"GLSA\", value:\"201604-05\");\n\n script_name(english:\"GLSA-201604-05 : Wireshark: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201604-05\n(Wireshark: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Wireshark. Please\n review the CVE identifiers referenced below for details.\n \nImpact :\n\n Remote attackers could cause Denial of Service and local attackers could\n escalate privileges.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201604-05\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Wireshark users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-analyzer/wireshark-2.0.2'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/04/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/04/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"net-analyzer/wireshark\", unaffected:make_list(\"ge 2.0.2\"), vulnerable:make_list(\"lt 2.0.2\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Wireshark\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-10-16T13:49:09", "description": "wireshark was updated to version 1.12.13 to fix the following issues :\n\n - CVE-2016-6504: wireshark: NDS dissector crash (bnc#991012)\n\n - CVE-2016-6505: wireshark: PacketBB dissector could divide by zero (bnc#991013)\n\n - CVE-2016-6506: wireshark: WSP infinite loop (bnc#991015)\n\n - CVE-2016-6507: wireshark: MMSE infinite loop (bnc#991016)\n\n - CVE-2016-6508: wireshark: RLC long loop (bnc#991017)\n\n - CVE-2016-6509: wireshark: LDSS dissector crash (bnc#991018)\n\n - CVE-2016-6510: wireshark: RLC dissector crash (bnc#991019)\n\n - CVE-2016-6511: wireshark: OpenFlow long loop (bnc991020)\n\n - CVE-2016-5350: SPOOLS infinite loop (bsc#983671).\n\n - CVE-2016-5351: IEEE 802.11 dissector crash (bsc#983671).\n\n - CVE-2016-5352: IEEE 802.11 dissector crash, different from wpna-sec-2016-30 (bsc#983671).\n\n - CVE-2016-5353: UMTS FP crash (bsc#983671).\n\n - CVE-2016-5354: USB dissector crash (bsc#983671).\n\n - CVE-2016-5355: Toshiba file parser crash (bsc#983671).\n\n - CVE-2016-5356: CoSine file parser crash (bsc#983671).\n\n - CVE-2016-5357: NetScreen file parser crash (bsc#983671).\n\n - CVE-2016-5358: Ethernet dissector crash (bsc#983671).\n\n - CVE-2016-5359: WBXML infinite loop (bsc#983671). For more details please see:\n https://www.wireshark.org/docs/relnotes/wireshark-1.12.1 2.html https://www.wireshark.org/docs/relnotes/wireshark-1.12.1 3.html\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2016-10-05T00:00:00", "type": "nessus", "title": "SUSE SLED12 / SLES12 Security Update : wireshark (SUSE-SU-2016:2453-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-5350", "CVE-2016-5351", "CVE-2016-5352", "CVE-2016-5353", "CVE-2016-5354", "CVE-2016-5355", "CVE-2016-5356", "CVE-2016-5357", "CVE-2016-5358", "CVE-2016-5359", "CVE-2016-6504", "CVE-2016-6505", "CVE-2016-6506", "CVE-2016-6507", "CVE-2016-6508", "CVE-2016-6509", "CVE-2016-6510", "CVE-2016-6511"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:wireshark", "p-cpe:/a:novell:suse_linux:wireshark-debuginfo", "p-cpe:/a:novell:suse_linux:wireshark-debugsource", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2016-2453-1.NASL", "href": "https://www.tenable.com/plugins/nessus/93863", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2016:2453-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(93863);\n script_version(\"2.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2016-5350\", \"CVE-2016-5351\", \"CVE-2016-5352\", \"CVE-2016-5353\", \"CVE-2016-5354\", \"CVE-2016-5355\", \"CVE-2016-5356\", \"CVE-2016-5357\", \"CVE-2016-5358\", \"CVE-2016-5359\", \"CVE-2016-6504\", \"CVE-2016-6505\", \"CVE-2016-6506\", \"CVE-2016-6507\", \"CVE-2016-6508\", \"CVE-2016-6509\", \"CVE-2016-6510\", \"CVE-2016-6511\");\n\n script_name(english:\"SUSE SLED12 / SLES12 Security Update : wireshark (SUSE-SU-2016:2453-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"wireshark was updated to version 1.12.13 to fix the following issues :\n\n - CVE-2016-6504: wireshark: NDS dissector crash\n (bnc#991012)\n\n - CVE-2016-6505: wireshark: PacketBB dissector could\n divide by zero (bnc#991013)\n\n - CVE-2016-6506: wireshark: WSP infinite loop (bnc#991015)\n\n - CVE-2016-6507: wireshark: MMSE infinite loop\n (bnc#991016)\n\n - CVE-2016-6508: wireshark: RLC long loop (bnc#991017)\n\n - CVE-2016-6509: wireshark: LDSS dissector crash\n (bnc#991018)\n\n - CVE-2016-6510: wireshark: RLC dissector crash\n (bnc#991019)\n\n - CVE-2016-6511: wireshark: OpenFlow long loop (bnc991020)\n\n - CVE-2016-5350: SPOOLS infinite loop (bsc#983671).\n\n - CVE-2016-5351: IEEE 802.11 dissector crash (bsc#983671).\n\n - CVE-2016-5352: IEEE 802.11 dissector crash, different\n from wpna-sec-2016-30 (bsc#983671).\n\n - CVE-2016-5353: UMTS FP crash (bsc#983671).\n\n - CVE-2016-5354: USB dissector crash (bsc#983671).\n\n - CVE-2016-5355: Toshiba file parser crash (bsc#983671).\n\n - CVE-2016-5356: CoSine file parser crash (bsc#983671).\n\n - CVE-2016-5357: NetScreen file parser crash (bsc#983671).\n\n - CVE-2016-5358: Ethernet dissector crash (bsc#983671).\n\n - CVE-2016-5359: WBXML infinite loop (bsc#983671). For\n more details please see:\n https://www.wireshark.org/docs/relnotes/wireshark-1.12.1\n 2.html\n https://www.wireshark.org/docs/relnotes/wireshark-1.12.1\n 3.html\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=983671\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=991012\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=991013\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=991015\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=991016\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=991017\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=991018\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=991019\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=991020\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5350/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5351/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5352/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5353/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5354/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5355/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5356/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5357/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5358/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5359/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-6504/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-6505/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-6506/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-6507/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-6508/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-6509/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-6510/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-6511/\"\n );\n # https://www.suse.com/support/update/announcement/2016/suse-su-20162453-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?564202bb\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.12.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.13.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 12-SP1:zypper in -t\npatch SUSE-SLE-SDK-12-SP1-2016-1429=1\n\nSUSE Linux Enterprise Server 12-SP1:zypper in -t patch\nSUSE-SLE-SERVER-12-SP1-2016-1429=1\n\nSUSE Linux Enterprise Desktop 12-SP1:zypper in -t patch\nSUSE-SLE-DESKTOP-12-SP1-2016-1429=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/08/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/10/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/10/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED12|SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED12 / SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED12\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED12 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"wireshark-1.12.13-31.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"wireshark-debuginfo-1.12.13-31.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"wireshark-debugsource-1.12.13-31.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"wireshark-1.12.13-31.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"wireshark-debuginfo-1.12.13-31.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"wireshark-debugsource-1.12.13-31.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T12:40:35", "description": "This update to wireshark 1.12.13 fixes the following issues :\n\n - CVE-2016-6504: wireshark: NDS dissector crash (bsc#991012)\n\n - CVE-2016-6505: wireshark: PacketBB dissector could divide by zero (bsc#991013)\n\n - CVE-2016-6506: wireshark: WSP infinite loop (bsc#991015)\n\n - CVE-2016-6507: wireshark: MMSE infinite loop (bsc#991016)\n\n - CVE-2016-6508: wireshark: RLC long loop (bsc#991017)\n\n - CVE-2016-6509: wireshark: LDSS dissector crash (bsc#991018)\n\n - CVE-2016-6510: wireshark: RLC dissector crash (bsc#991019)\n\n - CVE-2016-6511: wireshark: OpenFlow long loop (bnc991020)\n\n - CVE-2016-5350: SPOOLS infinite loop (bsc#983671)\n\n - CVE-2016-5351: IEEE 802.11 dissector crash (bsc#983671)\n\n - CVE-2016-5352: IEEE 802.11 dissector crash, different from wpna-sec-2016-30 (bsc#983671)\n\n - CVE-2016-5353: UMTS FP crash (bsc#983671)\n\n - CVE-2016-5354: USB dissector crash (bsc#983671)\n\n - CVE-2016-5355: Toshiba file parser crash (bsc#983671)\n\n - CVE-2016-5356: CoSine file parser crash (bsc#983671)\n\n - CVE-2016-5357: NetScreen file parser crash (bsc#983671)\n\n - CVE-2016-5358: Ethernet dissector crash (bsc#983671)\n\n - CVE-2016-5359: WBXML infinite loop (bsc#983671) For more details please see:\n https://www.wireshark.org/docs/relnotes/wireshark-1.12.1 2.html https://www.wireshark.org/docs/relnotes/wireshark-1.12.1 3.html\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2016-09-06T00:00:00", "type": "nessus", "title": "SUSE SLES11 Security Update : wireshark (SUSE-SU-2016:2212-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-5350", "CVE-2016-5351", "CVE-2016-5352", "CVE-2016-5353", "CVE-2016-5354", "CVE-2016-5355", "CVE-2016-5356", "CVE-2016-5357", "CVE-2016-5358", "CVE-2016-5359", "CVE-2016-6504", "CVE-2016-6505", "CVE-2016-6506", "CVE-2016-6507", "CVE-2016-6508", "CVE-2016-6509", "CVE-2016-6510", "CVE-2016-6511"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:wireshark", "cpe:/o:novell:suse_linux:11"], "id": "SUSE_SU-2016-2212-1.NASL", "href": "https://www.tenable.com/plugins/nessus/93342", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2016:2212-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(93342);\n script_version(\"2.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2016-5350\", \"CVE-2016-5351\", \"CVE-2016-5352\", \"CVE-2016-5353\", \"CVE-2016-5354\", \"CVE-2016-5355\", \"CVE-2016-5356\", \"CVE-2016-5357\", \"CVE-2016-5358\", \"CVE-2016-5359\", \"CVE-2016-6504\", \"CVE-2016-6505\", \"CVE-2016-6506\", \"CVE-2016-6507\", \"CVE-2016-6508\", \"CVE-2016-6509\", \"CVE-2016-6510\", \"CVE-2016-6511\");\n\n script_name(english:\"SUSE SLES11 Security Update : wireshark (SUSE-SU-2016:2212-1)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update to wireshark 1.12.13 fixes the following issues :\n\n - CVE-2016-6504: wireshark: NDS dissector crash\n (bsc#991012)\n\n - CVE-2016-6505: wireshark: PacketBB dissector could\n divide by zero (bsc#991013)\n\n - CVE-2016-6506: wireshark: WSP infinite loop (bsc#991015)\n\n - CVE-2016-6507: wireshark: MMSE infinite loop\n (bsc#991016)\n\n - CVE-2016-6508: wireshark: RLC long loop (bsc#991017)\n\n - CVE-2016-6509: wireshark: LDSS dissector crash\n (bsc#991018)\n\n - CVE-2016-6510: wireshark: RLC dissector crash\n (bsc#991019)\n\n - CVE-2016-6511: wireshark: OpenFlow long loop (bnc991020)\n\n - CVE-2016-5350: SPOOLS infinite loop (bsc#983671)\n\n - CVE-2016-5351: IEEE 802.11 dissector crash (bsc#983671)\n\n - CVE-2016-5352: IEEE 802.11 dissector crash, different\n from wpna-sec-2016-30 (bsc#983671)\n\n - CVE-2016-5353: UMTS FP crash (bsc#983671)\n\n - CVE-2016-5354: USB dissector crash (bsc#983671)\n\n - CVE-2016-5355: Toshiba file parser crash (bsc#983671)\n\n - CVE-2016-5356: CoSine file parser crash (bsc#983671)\n\n - CVE-2016-5357: NetScreen file parser crash (bsc#983671)\n\n - CVE-2016-5358: Ethernet dissector crash (bsc#983671)\n\n - CVE-2016-5359: WBXML infinite loop (bsc#983671) For more\n details please see:\n https://www.wireshark.org/docs/relnotes/wireshark-1.12.1\n 2.html\n https://www.wireshark.org/docs/relnotes/wireshark-1.12.1\n 3.html\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=983671\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=991012\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=991013\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=991015\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=991016\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=991017\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=991018\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=991019\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=991020\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5350/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5351/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5352/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5353/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5354/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5355/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5356/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5357/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5358/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-5359/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-6504/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-6505/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-6506/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-6507/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-6508/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-6509/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-6510/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-6511/\"\n );\n # https://www.suse.com/support/update/announcement/2016/suse-su-20162212-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f98d75a1\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.12.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.13.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 11-SP4:zypper in -t\npatch sdksp4-wireshark-12725=1\n\nSUSE Linux Enterprise Server 11-SP4:zypper in -t patch\nslessp4-wireshark-12725=1\n\nSUSE Linux Enterprise Debuginfo 11-SP4:zypper in -t patch\ndbgsp4-wireshark-12725=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/08/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/09/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/09/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES11)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES11\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES11\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES11 SP4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"wireshark-1.12.13-0.23.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-01-11T16:37:49", "description": "Multiple vulnerabilities were discovered in the dissectors/parsers for PKTC, IAX2, GSM CBCH and NCP which could result in denial of service.", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-05-23T00:00:00", "type": "nessus", "title": "Debian DSA-3585-1 : wireshark - security update", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-4006", "CVE-2016-4079", "CVE-2016-4080", "CVE-2016-4081", "CVE-2016-4082", "CVE-2016-4085"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:wireshark", "cpe:/o:debian:debian_linux:8.0"], "id": "DEBIAN_DSA-3585.NASL", "href": "https://www.tenable.com/plugins/nessus/91288", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3585. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(91288);\n script_version(\"2.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-4006\", \"CVE-2016-4079\", \"CVE-2016-4080\", \"CVE-2016-4081\", \"CVE-2016-4082\", \"CVE-2016-4085\");\n script_xref(name:\"DSA\", value:\"3585\");\n\n script_name(english:\"Debian DSA-3585-1 : wireshark - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities were discovered in the dissectors/parsers for\nPKTC, IAX2, GSM CBCH and NCP which could result in denial of service.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/wireshark\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2016/dsa-3585\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the wireshark packages.\n\nFor the stable distribution (jessie), these problems have been fixed\nin version 1.12.1+g01b65bf-4+deb8u6.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/05/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/05/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark-data\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark5\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwiretap-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwiretap4\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwsutil-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwsutil4\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"tshark\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-common\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-dbg\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-doc\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-qt\", reference:\"1.12.1+g01b65bf-4+deb8u6\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-01-11T14:29:07", "description": "The network analysis tool wireshark was updated to version 2.0.13 to fix the following issues :\n\n - CVE-2017-9352: Bazaar dissector infinite loop (wnpa-sec-2017-22) (bsc#1042304)\n\n - CVE-2017-9348: DOF dissector read overflow (wnpa-sec-2017-23) (bsc#1042303)\n\n - CVE-2017-9351: DHCP dissector read overflow (wnpa-sec-2017-24) (bsc#1042302)\n\n - CVE-2017-9346: SoulSeek dissector infinite loop (wnpa-sec-2017-25) (bsc#1042301)\n\n - CVE-2017-9345: DNS dissector infinite loop (wnpa-sec-2017-26) (bsc#1042300)\n\n - CVE-2017-9349: DICOM dissector infinite loop (wnpa-sec-2017-27) (bsc#1042305)\n\n - CVE-2017-9350: openSAFETY dissector memory exh..\n (wnpa-sec-2017-28) (bsc#1042299)\n\n - CVE-2017-9344: BT L2CAP dissector divide by zero (wnpa-sec-2017-29) (bsc#1042298)\n\n - CVE-2017-9343: MSNIP dissector crash (wnpa-sec-2017-30) (bsc#1042309)\n\n - CVE-2017-9347: ROS dissector crash (wnpa-sec-2017-31) (bsc#1042308)\n\n - CVE-2017-9354: RGMP dissector crash (wnpa-sec-2017-32) (bsc#1042307)\n\n - CVE-2017-9353: wireshark: IPv6 dissector crash (wnpa-sec-2017-33) (bsc#1042306)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2017-06-26T00:00:00", "type": "nessus", "title": "SUSE SLES11 Security Update : wireshark (SUSE-SU-2017:1664-1)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-9343", "CVE-2017-9344", "CVE-2017-9345", "CVE-2017-9346", "CVE-2017-9347", "CVE-2017-9348", "CVE-2017-9349", "CVE-2017-9350", "CVE-2017-9351", "CVE-2017-9352", "CVE-2017-9353", "CVE-2017-9354"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:wireshark", "p-cpe:/a:novell:suse_linux:wireshark-gtk", "cpe:/o:novell:suse_linux:11"], "id": "SUSE_SU-2017-1664-1.NASL", "href": "https://www.tenable.com/plugins/nessus/101043", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2017:1664-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(101043);\n script_version(\"3.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2017-9343\", \"CVE-2017-9344\", \"CVE-2017-9345\", \"CVE-2017-9346\", \"CVE-2017-9347\", \"CVE-2017-9348\", \"CVE-2017-9349\", \"CVE-2017-9350\", \"CVE-2017-9351\", \"CVE-2017-9352\", \"CVE-2017-9353\", \"CVE-2017-9354\");\n\n script_name(english:\"SUSE SLES11 Security Update : wireshark (SUSE-SU-2017:1664-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The network analysis tool wireshark was updated to version 2.0.13 to\nfix the following issues :\n\n - CVE-2017-9352: Bazaar dissector infinite loop\n (wnpa-sec-2017-22) (bsc#1042304)\n\n - CVE-2017-9348: DOF dissector read overflow\n (wnpa-sec-2017-23) (bsc#1042303)\n\n - CVE-2017-9351: DHCP dissector read overflow\n (wnpa-sec-2017-24) (bsc#1042302)\n\n - CVE-2017-9346: SoulSeek dissector infinite loop\n (wnpa-sec-2017-25) (bsc#1042301)\n\n - CVE-2017-9345: DNS dissector infinite loop\n (wnpa-sec-2017-26) (bsc#1042300)\n\n - CVE-2017-9349: DICOM dissector infinite loop\n (wnpa-sec-2017-27) (bsc#1042305)\n\n - CVE-2017-9350: openSAFETY dissector memory exh..\n (wnpa-sec-2017-28) (bsc#1042299)\n\n - CVE-2017-9344: BT L2CAP dissector divide by zero\n (wnpa-sec-2017-29) (bsc#1042298)\n\n - CVE-2017-9343: MSNIP dissector crash (wnpa-sec-2017-30)\n (bsc#1042309)\n\n - CVE-2017-9347: ROS dissector crash (wnpa-sec-2017-31)\n (bsc#1042308)\n\n - CVE-2017-9354: RGMP dissector crash (wnpa-sec-2017-32)\n (bsc#1042307)\n\n - CVE-2017-9353: wireshark: IPv6 dissector crash\n (wnpa-sec-2017-33) (bsc#1042306)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042298\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042299\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042300\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042301\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042302\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042303\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042304\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042305\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042306\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042307\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042308\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042309\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9343/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9344/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9345/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9346/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9347/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9348/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9349/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9350/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9351/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9352/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9353/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9354/\"\n );\n # https://www.suse.com/support/update/announcement/2017/suse-su-20171664-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6c14fcb9\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 11-SP4:zypper in -t\npatch sdksp4-wireshark-13170=1\n\nSUSE Linux Enterprise Server 11-SP4:zypper in -t patch\nslessp4-wireshark-13170=1\n\nSUSE Linux Enterprise Debuginfo 11-SP4:zypper in -t patch\ndbgsp4-wireshark-13170=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/06/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/06/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES11)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES11\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES11\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES11 SP4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"wireshark-2.0.13-39.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"wireshark-gtk-2.0.13-39.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-01-11T14:28:05", "description": "This update for wireshark fixes minor vulnerabilities that could be used to trigger dissector crashes, infinite loops, or cause excessive use of CPU resources by making Wireshark read specially crafted packages from the network or a capture file :\n\n - CVE-2017-9352: Bazaar dissector infinite loop (boo#1042304)\n\n - CVE-2017-9348: DOF dissector read overflow (boo#1042303)\n\n - CVE-2017-9351: DHCP dissector read overflow (boo#1042302)\n\n - CVE-2017-9346: SoulSeek dissector infinite loop (boo#1042301)\n\n - CVE-2017-9345: DNS dissector infinite loop (boo#1042300)\n\n - CVE-2017-9349: DICOM dissector infinite loop (boo#1042305)\n\n - CVE-2017-9350: openSAFETY dissector memory exhaustion (boo#1042299)\n\n - CVE-2017-9344: BT L2CAP dissector divide by zero (boo#1042298)\n\n - CVE-2017-9343: MSNIP dissector crash (boo#1042309)\n\n - CVE-2017-9347: ROS dissector crash (boo#1042308)\n\n - CVE-2017-9354: RGMP dissector crash (boo#1042307)\n\n - CVE-2017-9353: IPv6 dissector crash (boo#1042306)", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2017-06-13T00:00:00", "type": "nessus", "title": "openSUSE Security Update : wireshark (openSUSE-2017-674)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-9343", "CVE-2017-9344", "CVE-2017-9345", "CVE-2017-9346", "CVE-2017-9347", "CVE-2017-9348", "CVE-2017-9349", "CVE-2017-9350", "CVE-2017-9351", "CVE-2017-9352", "CVE-2017-9353", "CVE-2017-9354"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:wireshark", "p-cpe:/a:novell:opensuse:wireshark-debuginfo", "p-cpe:/a:novell:opensuse:wireshark-debugsource", "p-cpe:/a:novell:opensuse:wireshark-devel", "p-cpe:/a:novell:opensuse:wireshark-ui-gtk", "p-cpe:/a:novell:opensuse:wireshark-ui-gtk-debuginfo", "p-cpe:/a:novell:opensuse:wireshark-ui-qt", "p-cpe:/a:novell:opensuse:wireshark-ui-qt-debuginfo", "cpe:/o:novell:opensuse:42.2"], "id": "OPENSUSE-2017-674.NASL", "href": "https://www.tenable.com/plugins/nessus/100752", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2017-674.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(100752);\n script_version(\"3.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2017-9343\", \"CVE-2017-9344\", \"CVE-2017-9345\", \"CVE-2017-9346\", \"CVE-2017-9347\", \"CVE-2017-9348\", \"CVE-2017-9349\", \"CVE-2017-9350\", \"CVE-2017-9351\", \"CVE-2017-9352\", \"CVE-2017-9353\", \"CVE-2017-9354\");\n\n script_name(english:\"openSUSE Security Update : wireshark (openSUSE-2017-674)\");\n script_summary(english:\"Check for the openSUSE-2017-674 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for wireshark fixes minor vulnerabilities that could be\nused to trigger dissector crashes, infinite loops, or cause excessive\nuse of CPU resources by making Wireshark read specially crafted\npackages from the network or a capture file :\n\n - CVE-2017-9352: Bazaar dissector infinite loop\n (boo#1042304)\n\n - CVE-2017-9348: DOF dissector read overflow (boo#1042303)\n\n - CVE-2017-9351: DHCP dissector read overflow\n (boo#1042302)\n\n - CVE-2017-9346: SoulSeek dissector infinite loop\n (boo#1042301)\n\n - CVE-2017-9345: DNS dissector infinite loop (boo#1042300)\n\n - CVE-2017-9349: DICOM dissector infinite loop\n (boo#1042305)\n\n - CVE-2017-9350: openSAFETY dissector memory exhaustion\n (boo#1042299)\n\n - CVE-2017-9344: BT L2CAP dissector divide by zero\n (boo#1042298)\n\n - CVE-2017-9343: MSNIP dissector crash (boo#1042309)\n\n - CVE-2017-9347: ROS dissector crash (boo#1042308)\n\n - CVE-2017-9354: RGMP dissector crash (boo#1042307)\n\n - CVE-2017-9353: IPv6 dissector crash (boo#1042306)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1042298\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1042299\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1042300\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1042301\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1042302\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1042303\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1042304\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1042305\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1042306\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1042307\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1042308\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1042309\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1042330\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected wireshark packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-gtk-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:wireshark-ui-qt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.2\", reference:\"wireshark-2.2.7-14.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"wireshark-debuginfo-2.2.7-14.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"wireshark-debugsource-2.2.7-14.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"wireshark-devel-2.2.7-14.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"wireshark-ui-gtk-2.2.7-14.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"wireshark-ui-gtk-debuginfo-2.2.7-14.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"wireshark-ui-qt-2.2.7-14.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"wireshark-ui-qt-debuginfo-2.2.7-14.6.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark / wireshark-debuginfo / wireshark-debugsource / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-01-11T14:29:31", "description": "The network debugging tool wireshark was updated to version 2.2.7 to fix the following issues :\n\n - CVE-2017-9352: Bazaar dissector infinite loop (wnpa-sec-2017-22) (bsc#1042304)\n\n - CVE-2017-9348: DOF dissector read overflow (wnpa-sec-2017-23) (bsc#1042303)\n\n - CVE-2017-9351: DHCP dissector read overflow (wnpa-sec-2017-24) (bsc#1042302)\n\n - CVE-2017-9346: SoulSeek dissector infinite loop (wnpa-sec-2017-25) (bsc#1042301)\n\n - CVE-2017-9345: DNS dissector infinite loop (wnpa-sec-2017-26) (bsc#1042300)\n\n - CVE-2017-9349: DICOM dissector infinite loop (wnpa-sec-2017-27) (bsc#1042305)\n\n - CVE-2017-9350: openSAFETY dissector memory exh..\n (wnpa-sec-2017-28) (bsc#1042299)\n\n - CVE-2017-9344: BT L2CAP dissector divide by zero (wnpa-sec-2017-29) (bsc#1042298)\n\n - CVE-2017-9343: MSNIP dissector crash (wnpa-sec-2017-30) (bsc#1042309)\n\n - CVE-2017-9347: ROS dissector crash (wnpa-sec-2017-31) (bsc#1042308)\n\n - CVE-2017-9354: RGMP dissector crash (wnpa-sec-2017-32) (bsc#1042307)\n\n - CVE-2017-9353: wireshark: IPv6 dissector crash (wnpa-sec-2017-33) (bsc#1042306)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2017-06-26T00:00:00", "type": "nessus", "title": "SUSE SLED12 / SLES12 Security Update : wireshark (SUSE-SU-2017:1663-1)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-9343", "CVE-2017-9344", "CVE-2017-9345", "CVE-2017-9346", "CVE-2017-9347", "CVE-2017-9348", "CVE-2017-9349", "CVE-2017-9350", "CVE-2017-9351", "CVE-2017-9352", "CVE-2017-9353", "CVE-2017-9354"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libwireshark8", "p-cpe:/a:novell:suse_linux:libwireshark8-debuginfo", "p-cpe:/a:novell:suse_linux:libwiretap6", "p-cpe:/a:novell:suse_linux:libwiretap6-debuginfo", "p-cpe:/a:novell:suse_linux:libwscodecs1", "p-cpe:/a:novell:suse_linux:libwscodecs1-debuginfo", "p-cpe:/a:novell:suse_linux:libwsutil7", "p-cpe:/a:novell:suse_linux:libwsutil7-debuginfo", "p-cpe:/a:novell:suse_linux:wireshark", "p-cpe:/a:novell:suse_linux:wireshark-debuginfo", "p-cpe:/a:novell:suse_linux:wireshark-debugsource", "p-cpe:/a:novell:suse_linux:wireshark-gtk", "p-cpe:/a:novell:suse_linux:wireshark-gtk-debuginfo", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2017-1663-1.NASL", "href": "https://www.tenable.com/plugins/nessus/101042", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2017:1663-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(101042);\n script_version(\"3.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2017-9343\", \"CVE-2017-9344\", \"CVE-2017-9345\", \"CVE-2017-9346\", \"CVE-2017-9347\", \"CVE-2017-9348\", \"CVE-2017-9349\", \"CVE-2017-9350\", \"CVE-2017-9351\", \"CVE-2017-9352\", \"CVE-2017-9353\", \"CVE-2017-9354\");\n\n script_name(english:\"SUSE SLED12 / SLES12 Security Update : wireshark (SUSE-SU-2017:1663-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The network debugging tool wireshark was updated to version 2.2.7 to\nfix the following issues :\n\n - CVE-2017-9352: Bazaar dissector infinite loop\n (wnpa-sec-2017-22) (bsc#1042304)\n\n - CVE-2017-9348: DOF dissector read overflow\n (wnpa-sec-2017-23) (bsc#1042303)\n\n - CVE-2017-9351: DHCP dissector read overflow\n (wnpa-sec-2017-24) (bsc#1042302)\n\n - CVE-2017-9346: SoulSeek dissector infinite loop\n (wnpa-sec-2017-25) (bsc#1042301)\n\n - CVE-2017-9345: DNS dissector infinite loop\n (wnpa-sec-2017-26) (bsc#1042300)\n\n - CVE-2017-9349: DICOM dissector infinite loop\n (wnpa-sec-2017-27) (bsc#1042305)\n\n - CVE-2017-9350: openSAFETY dissector memory exh..\n (wnpa-sec-2017-28) (bsc#1042299)\n\n - CVE-2017-9344: BT L2CAP dissector divide by zero\n (wnpa-sec-2017-29) (bsc#1042298)\n\n - CVE-2017-9343: MSNIP dissector crash (wnpa-sec-2017-30)\n (bsc#1042309)\n\n - CVE-2017-9347: ROS dissector crash (wnpa-sec-2017-31)\n (bsc#1042308)\n\n - CVE-2017-9354: RGMP dissector crash (wnpa-sec-2017-32)\n (bsc#1042307)\n\n - CVE-2017-9353: wireshark: IPv6 dissector crash\n (wnpa-sec-2017-33) (bsc#1042306)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042298\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042299\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042300\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042301\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042302\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042303\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042304\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042305\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042306\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042307\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042308\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042309\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9343/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9344/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9345/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9346/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9347/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9348/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9349/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9350/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9351/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9352/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9353/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9354/\"\n );\n # https://www.suse.com/support/update/announcement/2017/suse-su-20171663-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ec52156b\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 12-SP2:zypper in -t\npatch SUSE-SLE-SDK-12-SP2-2017-1031=1\n\nSUSE Linux Enterprise Server for Raspberry Pi 12-SP2:zypper in -t\npatch SUSE-SLE-RPI-12-SP2-2017-1031=1\n\nSUSE Linux Enterprise Server 12-SP2:zypper in -t patch\nSUSE-SLE-SERVER-12-SP2-2017-1031=1\n\nSUSE Linux Enterprise Desktop 12-SP2:zypper in -t patch\nSUSE-SLE-DESKTOP-12-SP2-2017-1031=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwireshark8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwireshark8-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwiretap6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwiretap6-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwscodecs1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwscodecs1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwsutil7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libwsutil7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:wireshark-gtk-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/06/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/06/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED12|SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED12 / SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP2\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED12\" && (! preg(pattern:\"^(2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED12 SP2\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwireshark8-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwireshark8-debuginfo-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwiretap6-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwiretap6-debuginfo-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwscodecs1-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwscodecs1-debuginfo-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwsutil7-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwsutil7-debuginfo-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"wireshark-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"wireshark-debuginfo-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"wireshark-debugsource-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"wireshark-gtk-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"wireshark-gtk-debuginfo-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwireshark8-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwireshark8-debuginfo-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwiretap6-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwiretap6-debuginfo-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwscodecs1-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwscodecs1-debuginfo-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwsutil7-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"libwsutil7-debuginfo-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"wireshark-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"wireshark-debuginfo-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"wireshark-debugsource-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"wireshark-gtk-2.2.7-47.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"wireshark-gtk-debuginfo-2.2.7-47.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-01-11T14:28:52", "description": "The version of Wireshark installed on the remote Windows host is 2.0.x prior to 2.0.13 or 2.2.x prior to 2.2.7. It is, therefore, affected by multiple denial of service vulnerabilities :\n\n - A NULL pointer dereference flaw exists in the dissect_msnip() function within file epan/dissectors/packet-msnip.c due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a denial of service condition. (CVE-2017-9343)\n\n - A divide-by-zero error exists in the dissect_connparamrequest() function within file epan/dissectors/packet-btl2cap.c due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a denial of service condition. (CVE-2017-9344)\n\n - An infinite loop condition exists in the expand_dns_name() function within file epan/dissectors/packet-dns.c when handling packets or packet trace files. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to consume excessive CPU resources, resulting in a denial of service condition.\n (CVE-2017-9345)\n\n - An infinite loop condition exists in the dissect_slsk_pdu() function within file epan/dissectors/packet-slsk.c when handling packets or packet trace files. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to consume excessive CPU resources, resulting in a denial of service condition.\n (CVE-2017-9346)\n\n - A NULL pointer dereference flaw exists in the ros_try_string() function within file epan/dissectors/asn1/ros/packet-ros-template.c due to improper validation of user-supplied input passed as an OID string. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a denial of service condition. This issue only affects version 2.2.x. (CVE-2017-9347)\n\n - An out-of-bounds read error exists in the OALMarshal_UncompressValue() function within file epan/dissectors/packet-dof.c when handling Distributed Object Framework (DOF) packets. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a denial of service condition. This issue only affects version 2.2.x. (CVE-2017-9348)\n\n - An infinite loop condition exists in the dissect_dcm_pdu_data() function within file epan/dissectors/packet-dcm.c when handling packets or packet trace files. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to consume excessive CPU resources, resulting in a denial of service condition.\n (CVE-2017-9349)\n\n - A memory allocation issue exists in the dissect_opensafety_ssdo_message() function within file epan/dissectors/packet-opensafety.c due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a denial of service condition. (CVE-2017-9350)\n\n - An out-of-bounds read error exists in the bootp_option() function within file epan/dissectors/packet-bootp.c when handling vendor class identifier strings in bootp packets due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a denial of service condition.\n (CVE-2017-9351)\n\n - An infinite loop condition exists in the get_bzr_pdu_len() function within file epan/dissectors/packet-bzr.c when handling packets or packet trace files. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to consume excessive CPU resources, resulting in a denial of service condition.\n (CVE-2017-9352)\n\n - A NULL pointer dereference flaw exists in the dissect_routing6_rpl() function within file epan/dissectors/packet-ipv6.c due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a denial of service condition. This issue only affects version 2.2.x. (CVE-2017-9353)\n\n - A NULL pointer dereference flaw exists in the dissect_rgmp() function within file epan/dissectors/packet-rgmp.c due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a denial of service condition. (CVE-2017-9354)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2017-06-07T00:00:00", "type": "nessus", "title": "Wireshark 2.0.x < 2.0.13 / 2.2.x < 2.2.7 Multiple DoS", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-9343", "CVE-2017-9344", "CVE-2017-9345", "CVE-2017-9346", "CVE-2017-9347", "CVE-2017-9348", "CVE-2017-9349", "CVE-2017-9350", "CVE-2017-9351", "CVE-2017-9352", "CVE-2017-9353", "CVE-2017-9354"], "modified": "2018-08-07T00:00:00", "cpe": ["cpe:/a:wireshark:wireshark"], "id": "WIRESHARK_2_2_7.NASL", "href": "https://www.tenable.com/plugins/nessus/100671", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(100671);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2018/08/07 16:46:51\");\n\n script_cve_id(\n \"CVE-2017-9343\",\n \"CVE-2017-9344\",\n \"CVE-2017-9345\",\n \"CVE-2017-9346\",\n \"CVE-2017-9347\",\n \"CVE-2017-9348\",\n \"CVE-2017-9349\",\n \"CVE-2017-9350\",\n \"CVE-2017-9351\",\n \"CVE-2017-9352\",\n \"CVE-2017-9353\",\n \"CVE-2017-9354\"\n );\n script_bugtraq_id(\n 98796,\n 98797,\n 98798,\n 98799,\n 98800,\n 98801,\n 98802,\n 98803,\n 98804,\n 98805,\n 98806,\n 98808\n );\n\n script_name(english:\"Wireshark 2.0.x < 2.0.13 / 2.2.x < 2.2.7 Multiple DoS\");\n script_summary(english:\"Checks the version of Wireshark.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"An application installed on the remote Windows host is affected by\nmultiple denial of service vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Wireshark installed on the remote Windows host is 2.0.x\nprior to 2.0.13 or 2.2.x prior to 2.2.7. It is, therefore, affected by\nmultiple denial of service vulnerabilities :\n\n - A NULL pointer dereference flaw exists in the\n dissect_msnip() function within file\n epan/dissectors/packet-msnip.c due to improper\n validation of user-supplied input. An unauthenticated,\n remote attacker can exploit this, via a specially\n crafted packet or packet trace file, to cause a denial\n of service condition. (CVE-2017-9343)\n\n - A divide-by-zero error exists in the\n dissect_connparamrequest() function within file\n epan/dissectors/packet-btl2cap.c due to improper\n validation of user-supplied input. An unauthenticated,\n remote attacker can exploit this, via a specially\n crafted packet or packet trace file, to cause a denial\n of service condition. (CVE-2017-9344)\n\n - An infinite loop condition exists in the\n expand_dns_name() function within file\n epan/dissectors/packet-dns.c when handling packets or\n packet trace files. An unauthenticated, remote attacker\n can exploit this, via a specially crafted packet or\n packet trace file, to consume excessive CPU resources,\n resulting in a denial of service condition.\n (CVE-2017-9345)\n\n - An infinite loop condition exists in the\n dissect_slsk_pdu() function within file\n epan/dissectors/packet-slsk.c when handling packets or\n packet trace files. An unauthenticated, remote attacker\n can exploit this, via a specially crafted packet or\n packet trace file, to consume excessive CPU resources,\n resulting in a denial of service condition.\n (CVE-2017-9346)\n\n - A NULL pointer dereference flaw exists in the\n ros_try_string() function within file\n epan/dissectors/asn1/ros/packet-ros-template.c due to\n improper validation of user-supplied input passed as an\n OID string. An unauthenticated, remote attacker can\n exploit this, via a specially crafted packet or packet\n trace file, to cause a denial of service condition. This\n issue only affects version 2.2.x. (CVE-2017-9347)\n\n - An out-of-bounds read error exists in the\n OALMarshal_UncompressValue() function within file\n epan/dissectors/packet-dof.c when handling Distributed\n Object Framework (DOF) packets. An unauthenticated,\n remote attacker can exploit this, via a specially\n crafted packet or packet trace file, to cause a denial\n of service condition. This issue only affects version\n 2.2.x. (CVE-2017-9348)\n\n - An infinite loop condition exists in the\n dissect_dcm_pdu_data() function within file\n epan/dissectors/packet-dcm.c when handling packets or\n packet trace files. An unauthenticated, remote attacker\n can exploit this, via a specially crafted packet or\n packet trace file, to consume excessive CPU resources,\n resulting in a denial of service condition.\n (CVE-2017-9349)\n\n - A memory allocation issue exists in the\n dissect_opensafety_ssdo_message() function within file\n epan/dissectors/packet-opensafety.c due to improper\n validation of user-supplied input. An unauthenticated,\n remote attacker can exploit this, via a specially\n crafted packet or packet trace file, to cause a denial\n of service condition. (CVE-2017-9350)\n\n - An out-of-bounds read error exists in the bootp_option()\n function within file epan/dissectors/packet-bootp.c when\n handling vendor class identifier strings in bootp\n packets due to improper validation of user-supplied\n input. An unauthenticated, remote attacker can exploit\n this, via a specially crafted packet or packet trace\n file, to cause a denial of service condition.\n (CVE-2017-9351)\n\n - An infinite loop condition exists in the\n get_bzr_pdu_len() function within file\n epan/dissectors/packet-bzr.c when handling packets or\n packet trace files. An unauthenticated, remote attacker\n can exploit this, via a specially crafted packet or\n packet trace file, to consume excessive CPU resources,\n resulting in a denial of service condition.\n (CVE-2017-9352)\n\n - A NULL pointer dereference flaw exists in the\n dissect_routing6_rpl() function within file\n epan/dissectors/packet-ipv6.c due to improper validation\n of user-supplied input. An unauthenticated, remote\n attacker can exploit this, via a specially crafted\n packet or packet trace file, to cause a denial of\n service condition. This issue only affects version\n 2.2.x. (CVE-2017-9353)\n\n - A NULL pointer dereference flaw exists in the\n dissect_rgmp() function within file\n epan/dissectors/packet-rgmp.c due to improper validation\n of user-supplied input. An unauthenticated, remote\n attacker can exploit this, via a specially crafted\n packet or packet trace file, to cause a denial of\n service condition. (CVE-2017-9354)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/docs/relnotes/wireshark-2.0.13.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/docs/relnotes/wireshark-2.2.7.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-33.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-32.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-31.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-30.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-29.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-28.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-27.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-26.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-25.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-24.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-23.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-22.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Wireshark version 2.0.13 / 2.2.7 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/04/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/06/07\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:wireshark:wireshark\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"wireshark_installed.nasl\");\n script_require_keys(\"installed_sw/Wireshark\", \"SMB/Registry/Enumerated\");\n\n exit(0);\n}\n\n\ninclude(\"vcf.inc\");\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\n\napp_info = vcf::get_app_info(app:\"Wireshark\", win_local:TRUE);\n\nconstraints = [\n { \"min_version\" : \"2.0.0\", \"fixed_version\" : \"2.0.13\" },\n { \"min_version\" : \"2.2.0\", \"fixed_version\" : \"2.2.7\" }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-01-11T14:27:32", "description": "The version of Wireshark installed on the remote macOS or Mac OS X host is 2.0.x prior to 2.0.13 or 2.2.x prior to 2.2.7. It is, therefore, affected by multiple denial of service vulnerabilities :\n\n - A NULL pointer dereference flaw exists in the dissect_msnip() function within file epan/dissectors/packet-msnip.c due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a denial of service condition. (CVE-2017-9343)\n\n - A divide-by-zero error exists in the dissect_connparamrequest() function within file epan/dissectors/packet-btl2cap.c due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a denial of service condition. (CVE-2017-9344)\n\n - An infinite loop condition exists in the expand_dns_name() function within file epan/dissectors/packet-dns.c when handling packets or packet trace files. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to consume excessive CPU resources, resulting in a denial of service condition.\n (CVE-2017-9345)\n\n - An infinite loop condition exists in the dissect_slsk_pdu() function within file epan/dissectors/packet-slsk.c when handling packets or packet trace files. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to consume excessive CPU resources, resulting in a denial of service condition.\n (CVE-2017-9346)\n\n - A NULL pointer dereference flaw exists in the ros_try_string() function within file epan/dissectors/asn1/ros/packet-ros-template.c due to improper validation of user-supplied input passed as an OID string. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a denial of service condition. This issue only affects version 2.2.x. (CVE-2017-9347)\n\n - An out-of-bounds read error exists in the OALMarshal_UncompressValue() function within file epan/dissectors/packet-dof.c when handling Distributed Object Framework (DOF) packets. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a denial of service condition. This issue only affects version 2.2.x. (CVE-2017-9348)\n\n - An infinite loop condition exists in the dissect_dcm_pdu_data() function within file epan/dissectors/packet-dcm.c when handling packets or packet trace files. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to consume excessive CPU resources, resulting in a denial of service condition.\n (CVE-2017-9349)\n\n - A memory allocation issue exists in the dissect_opensafety_ssdo_message() function within file epan/dissectors/packet-opensafety.c due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a denial of service condition. (CVE-2017-9350)\n\n - An out-of-bounds read error exists in the bootp_option() function within file epan/dissectors/packet-bootp.c when handling vendor class identifier strings in bootp packets due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a denial of service condition.\n (CVE-2017-9351)\n\n - An infinite loop condition exists in the get_bzr_pdu_len() function within file epan/dissectors/packet-bzr.c when handling packets or packet trace files. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to consume excessive CPU resources, resulting in a denial of service condition.\n (CVE-2017-9352)\n\n - A NULL pointer dereference flaw exists in the dissect_routing6_rpl() function within file epan/dissectors/packet-ipv6.c due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a denial of service condition. This issue only affects version 2.2.x. (CVE-2017-9353)\n\n - A NULL pointer dereference flaw exists in the dissect_rgmp() function within file epan/dissectors/packet-rgmp.c due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a denial of service condition. (CVE-2017-9354)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2017-06-07T00:00:00", "type": "nessus", "title": "Wireshark 2.0.x < 2.0.13 / 2.2.x < 2.2.7 Multiple DoS (macOS)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-9343", "CVE-2017-9344", "CVE-2017-9345", "CVE-2017-9346", "CVE-2017-9347", "CVE-2017-9348", "CVE-2017-9349", "CVE-2017-9350", "CVE-2017-9351", "CVE-2017-9352", "CVE-2017-9353", "CVE-2017-9354"], "modified": "2018-07-14T00:00:00", "cpe": ["cpe:/a:wireshark:wireshark"], "id": "MACOSX_WIRESHARK_2_2_7.NASL", "href": "https://www.tenable.com/plugins/nessus/100670", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(100670);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2018/07/14 1:59:37\");\n\n script_cve_id(\n \"CVE-2017-9343\",\n \"CVE-2017-9344\",\n \"CVE-2017-9345\",\n \"CVE-2017-9346\",\n \"CVE-2017-9347\",\n \"CVE-2017-9348\",\n \"CVE-2017-9349\",\n \"CVE-2017-9350\",\n \"CVE-2017-9351\",\n \"CVE-2017-9352\",\n \"CVE-2017-9353\",\n \"CVE-2017-9354\"\n );\n script_bugtraq_id(\n 98796,\n 98797,\n 98798,\n 98799,\n 98800,\n 98801,\n 98802,\n 98803,\n 98804,\n 98805,\n 98806,\n 98808\n );\n\n script_name(english:\"Wireshark 2.0.x < 2.0.13 / 2.2.x < 2.2.7 Multiple DoS (macOS)\");\n script_summary(english:\"Checks the version of Wireshark.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"An application installed on the remote macOS or Mac OS X host is\naffected by multiple denial of service vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Wireshark installed on the remote macOS or Mac OS X\nhost is 2.0.x prior to 2.0.13 or 2.2.x prior to 2.2.7. It is,\ntherefore, affected by multiple denial of service vulnerabilities :\n\n - A NULL pointer dereference flaw exists in the\n dissect_msnip() function within file\n epan/dissectors/packet-msnip.c due to improper\n validation of user-supplied input. An unauthenticated,\n remote attacker can exploit this, via a specially\n crafted packet or packet trace file, to cause a denial\n of service condition. (CVE-2017-9343)\n\n - A divide-by-zero error exists in the\n dissect_connparamrequest() function within file\n epan/dissectors/packet-btl2cap.c due to improper\n validation of user-supplied input. An unauthenticated,\n remote attacker can exploit this, via a specially\n crafted packet or packet trace file, to cause a denial\n of service condition. (CVE-2017-9344)\n\n - An infinite loop condition exists in the\n expand_dns_name() function within file\n epan/dissectors/packet-dns.c when handling packets or\n packet trace files. An unauthenticated, remote attacker\n can exploit this, via a specially crafted packet or\n packet trace file, to consume excessive CPU resources,\n resulting in a denial of service condition.\n (CVE-2017-9345)\n\n - An infinite loop condition exists in the\n dissect_slsk_pdu() function within file\n epan/dissectors/packet-slsk.c when handling packets or\n packet trace files. An unauthenticated, remote attacker\n can exploit this, via a specially crafted packet or\n packet trace file, to consume excessive CPU resources,\n resulting in a denial of service condition.\n (CVE-2017-9346)\n\n - A NULL pointer dereference flaw exists in the\n ros_try_string() function within file\n epan/dissectors/asn1/ros/packet-ros-template.c due to\n improper validation of user-supplied input passed as an\n OID string. An unauthenticated, remote attacker can\n exploit this, via a specially crafted packet or packet\n trace file, to cause a denial of service condition. This\n issue only affects version 2.2.x. (CVE-2017-9347)\n\n - An out-of-bounds read error exists in the\n OALMarshal_UncompressValue() function within file\n epan/dissectors/packet-dof.c when handling Distributed\n Object Framework (DOF) packets. An unauthenticated,\n remote attacker can exploit this, via a specially\n crafted packet or packet trace file, to cause a denial\n of service condition. This issue only affects version\n 2.2.x. (CVE-2017-9348)\n\n - An infinite loop condition exists in the\n dissect_dcm_pdu_data() function within file\n epan/dissectors/packet-dcm.c when handling packets or\n packet trace files. An unauthenticated, remote attacker\n can exploit this, via a specially crafted packet or\n packet trace file, to consume excessive CPU resources,\n resulting in a denial of service condition.\n (CVE-2017-9349)\n\n - A memory allocation issue exists in the\n dissect_opensafety_ssdo_message() function within file\n epan/dissectors/packet-opensafety.c due to improper\n validation of user-supplied input. An unauthenticated,\n remote attacker can exploit this, via a specially\n crafted packet or packet trace file, to cause a denial\n of service condition. (CVE-2017-9350)\n\n - An out-of-bounds read error exists in the bootp_option()\n function within file epan/dissectors/packet-bootp.c when\n handling vendor class identifier strings in bootp\n packets due to improper validation of user-supplied\n input. An unauthenticated, remote attacker can exploit\n this, via a specially crafted packet or packet trace\n file, to cause a denial of service condition.\n (CVE-2017-9351)\n\n - An infinite loop condition exists in the\n get_bzr_pdu_len() function within file\n epan/dissectors/packet-bzr.c when handling packets or\n packet trace files. An unauthenticated, remote attacker\n can exploit this, via a specially crafted packet or\n packet trace file, to consume excessive CPU resources,\n resulting in a denial of service condition.\n (CVE-2017-9352)\n\n - A NULL pointer dereference flaw exists in the\n dissect_routing6_rpl() function within file\n epan/dissectors/packet-ipv6.c due to improper validation\n of user-supplied input. An unauthenticated, remote\n attacker can exploit this, via a specially crafted\n packet or packet trace file, to cause a denial of\n service condition. This issue only affects version\n 2.2.x. (CVE-2017-9353)\n\n - A NULL pointer dereference flaw exists in the\n dissect_rgmp() function within file\n epan/dissectors/packet-rgmp.c due to improper validation\n of user-supplied input. An unauthenticated, remote\n attacker can exploit this, via a specially crafted\n packet or packet trace file, to cause a denial of\n service condition. (CVE-2017-9354)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/docs/relnotes/wireshark-2.0.13.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/docs/relnotes/wireshark-2.2.7.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-33.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-32.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-31.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-30.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-29.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-28.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-27.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-26.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-25.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-24.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-23.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-22.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Wireshark version 2.0.13 / 2.2.7 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/04/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/06/07\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:wireshark:wireshark\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"macosx_wireshark_installed.nbin\");\n script_require_keys(\"installed_sw/Wireshark\", \"Host/MacOSX/Version\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude(\"vcf.inc\");\n\nget_kb_item_or_exit(\"Host/MacOSX/Version\");\n\napp_info = vcf::get_app_info(app:\"Wireshark\");\n\nconstraints = [\n { \"min_version\" : \"2.0.0\", \"fixed_version\" : \"2.0.13\" },\n { \"min_version\" : \"2.2.0\", \"fixed_version\" : \"2.2.7\" }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-01-11T16:36:53", "description": "The version of Wireshark installed on the remote Mac OS X host is 1.12.x prior to 1.12.11. It is, therefore, affected by multiple denial of service vulnerabilities in the following components :\n\n - GSM CBCH dissector\n - IAX2 dissector\n - IEEE 802.11 dissector\n - NCP dissector\n - PKTC dissector", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-04-29T00:00:00", "type": "nessus", "title": "Wireshark 1.12.x < 1.12.11 Multiple DoS (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-4006", "CVE-2016-4078", "CVE-2016-4079", "CVE-2016-4080", "CVE-2016-4081", "CVE-2016-4082", "CVE-2016-4085"], "modified": "2019-11-20T00:00:00", "cpe": ["cpe:/a:wireshark:wireshark"], "id": "MACOSX_WIRESHARK_1_12_11.NASL", "href": "https://www.tenable.com/plugins/nessus/90784", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(90784);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/20\");\n\n script_cve_id(\n \"CVE-2016-4006\",\n \"CVE-2016-4078\",\n \"CVE-2016-4079\",\n \"CVE-2016-4080\",\n \"CVE-2016-4081\",\n \"CVE-2016-4082\",\n \"CVE-2016-4085\"\n );\n script_xref(name:\"EDB-ID\", value:\"39604\");\n script_xref(name:\"EDB-ID\", value:\"39644\");\n\n script_name(english:\"Wireshark 1.12.x < 1.12.11 Multiple DoS (Mac OS X)\");\n script_summary(english:\"Checks the version of Wireshark.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host has an application installed that is affected\nby multiple denial of service vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Wireshark installed on the remote Mac OS X host is\n1.12.x prior to 1.12.11. It is, therefore, affected by multiple denial\nof service vulnerabilities in the following components :\n\n - GSM CBCH dissector\n - IAX2 dissector\n - IEEE 802.11 dissector\n - NCP dissector\n - PKTC dissector\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Wireshark version 1.12.11 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-4085\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/02/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/04/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/04/29\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:wireshark:wireshark\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_wireshark_installed.nbin\");\n script_require_keys(\"installed_sw/Wireshark\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nget_kb_item_or_exit(\"Host/MacOSX/Version\");\n\napp_name = \"Wireshark\";\ninstall = get_single_install(app_name:app_name, exit_if_unknown_ver:TRUE);\nversion = install['version'];\npath = install['path'];\nfix = '1.12.11';\n\n# Affected :\n# 1.12.x < 1.12.11\nif (version =~ '^1\\\\.12\\\\.' && ver_compare(ver:version, fix:fix, strict:FALSE) < 0)\n{\n \n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n\n security_report_v4(port:0, severity:SECURITY_WARNING, extra:report);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-03-10T14:27:58", "description": "The version of Wireshark installed on the remote Windows host is 1.12.x prior to 1.12.11. It is, therefore, affected by multiple denial of service vulnerabilities in the following components :\n\n - GSM CBCH dissector\n - IAX2 dissector\n - IEEE 802.11 dissector\n - NCP dissector\n - PKTC dissector", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-04-29T00:00:00", "type": "nessus", "title": "Wireshark 1.12.x < 1.12.11 Multiple DoS", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-4006", "CVE-2016-4078", "CVE-2016-4079", "CVE-2016-4080", "CVE-2016-4081", "CVE-2016-4082", "CVE-2016-4085"], "modified": "2023-03-09T00:00:00", "cpe": ["cpe:/a:wireshark:wireshark"], "id": "WIRESHARK_1_12_11.NASL", "href": "https://www.tenable.com/plugins/nessus/90786", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(90786);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/03/09\");\n\n script_cve_id(\n \"CVE-2016-4006\",\n \"CVE-2016-4078\",\n \"CVE-2016-4079\",\n \"CVE-2016-4080\",\n \"CVE-2016-4081\",\n \"CVE-2016-4082\",\n \"CVE-2016-4085\"\n );\n script_xref(name:\"EDB-ID\", value:\"39604\");\n script_xref(name:\"EDB-ID\", value:\"39644\");\n\n script_name(english:\"Wireshark 1.12.x < 1.12.11 Multiple DoS\");\n script_summary(english:\"Checks the version of Wireshark.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host has an application installed that is affected\nby multiple denial of service vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Wireshark installed on the remote Windows host is\n1.12.x prior to 1.12.11. It is, therefore, affected by multiple denial\nof service vulnerabilities in the following components :\n\n - GSM CBCH dissector\n - IAX2 dissector\n - IEEE 802.11 dissector\n - NCP dissector\n - PKTC dissector\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Wireshark version 1.12.11 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-4085\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/02/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/04/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/04/29\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:wireshark:wireshark\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"wireshark_installed.nasl\");\n script_require_keys(\"installed_sw/Wireshark\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\nget_kb_item_or_exit('SMB/Registry/Enumerated');\n\nvar app_info = vcf::get_app_info(app:'Wireshark', win_local:TRUE);\n\nvar constraints = [\n { 'min_version' : '1.12.0', 'max_version' : '1.12.10', 'fixed_version' : '1.12.11' }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-01-17T14:23:19", "description": "Wireshark development team reports :\n\nThe following vulnerabilities have been fixed :\n\n- wnpa-sec-2016-41\n\nPacketBB crash. (Bug 12577)\n\n- wnpa-sec-2016-42\n\nWSP infinite loop. (Bug 12594)\n\n- wnpa-sec-2016-44\n\nRLC long loop. (Bug 12660)\n\n- wnpa-sec-2016-45\n\nLDSS dissector crash. (Bug 12662)\n\n- wnpa-sec-2016-46\n\nRLC dissector crash. (Bug 12664)\n\n- wnpa-sec-2016-47\n\nOpenFlow long loop. (Bug 12659)\n\n- wnpa-sec-2016-48\n\nMMSE, WAP, WBXML, and WSP infinite loop. (Bug 12661)\n\n- wnpa-sec-2016-49\n\nWBXML crash. (Bug 12663)", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-08-08T00:00:00", "type": "nessus", "title": "FreeBSD : wireshark -- multiple vulnerabilities (610101ea-5b6a-11e6-b334-002590263bf5)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-6505", "CVE-2016-6506", "CVE-2016-6508", "CVE-2016-6509", "CVE-2016-6510", "CVE-2016-6511", "CVE-2016-6512", "CVE-2016-6513"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:tshark", "p-cpe:/a:freebsd:freebsd:tshark-lite", "p-cpe:/a:freebsd:freebsd:wireshark", "p-cpe:/a:freebsd:freebsd:wireshark-lite", "p-cpe:/a:freebsd:freebsd:wireshark-qt5", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_610101EA5B6A11E6B334002590263BF5.NASL", "href": "https://www.tenable.com/plugins/nessus/92771", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(92771);\n script_version(\"2.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2016-6505\", \"CVE-2016-6506\", \"CVE-2016-6508\", \"CVE-2016-6509\", \"CVE-2016-6510\", \"CVE-2016-6511\", \"CVE-2016-6512\", \"CVE-2016-6513\");\n\n script_name(english:\"FreeBSD : wireshark -- multiple vulnerabilities (610101ea-5b6a-11e6-b334-002590263bf5)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Wireshark development team reports :\n\nThe following vulnerabilities have been fixed :\n\n- wnpa-sec-2016-41\n\nPacketBB crash. (Bug 12577)\n\n- wnpa-sec-2016-42\n\nWSP infinite loop. (Bug 12594)\n\n- wnpa-sec-2016-44\n\nRLC long loop. (Bug 12660)\n\n- wnpa-sec-2016-45\n\nLDSS dissector crash. (Bug 12662)\n\n- wnpa-sec-2016-46\n\nRLC dissector crash. (Bug 12664)\n\n- wnpa-sec-2016-47\n\nOpenFlow long loop. (Bug 12659)\n\n- wnpa-sec-2016-48\n\nMMSE, WAP, WBXML, and WSP infinite loop. (Bug 12661)\n\n- wnpa-sec-2016-49\n\nWBXML crash. (Bug 12663)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.wireshark.org/docs/relnotes/wireshark-2.0.5.html\"\n );\n # http://www.openwall.com/lists/oss-security/2016/08/01/4\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.openwall.com/lists/oss-security/2016/08/01/4\"\n );\n # https://vuxml.freebsd.org/freebsd/610101ea-5b6a-11e6-b334-002590263bf5.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?97d02d88\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:tshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:tshark-lite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:wireshark-lite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:wireshark-qt5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/07/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/08/08\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"wireshark<2.0.5\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"wireshark-lite<2.0.5\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"wireshark-qt5<2.0.5\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"tshark<2.0.5\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"tshark-lite<2.0.5\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-03-10T14:30:25", "description": "The version of Wireshark installed on the remote Windows host is 1.12.x prior to 1.12.12. It is, therefore, affected by multiple denial of service vulnerabilities :\n\n - An infinite loop exists in the SPOOLs dissector. A remote attacker, via a specially crafted packet or trace file, can exploit this to exhaust CPU resources, resulting in a denial of service condition.\n (CVE-2016-5350)\n\n - A flaw exists in the IEEE 802.11 dissector that is triggered when handling a malformed packet or trace file. A remote attacker can exploit this to cause a denial of service condition. (CVE-2016-5351)\n\n - A flaw exists in the UMTS FP dissector that is triggered when handling a malformed packet or trace file. A remote attacker can exploit this to cause a denial of service condition. (CVE-2016-5353)\n\n - A flaw exists in multiple USB dissectors that is triggered when a handling malformed packet or trace file. A remote attacker can exploit this to cause a denial of service condition. (CVE-2016-5354)\n\n - A flaw exists in the Toshiba file parser that is triggered when handling a malformed packet trace file. A remote attacker can exploit this, by convincing a user to open a specially crafted packet trace file, to cause a denial of service condition. (CVE-2016-5355)\n\n - A flaw exists in the CoSine file parser that is triggered when handling a malformed packet trace file. A remote attacker can exploit this to cause a denial of service condition. (CVE-2016-5356)\n\n - A flaw exists in the NetScreen file parser that is triggered when handling a malformed packet trace file. A remote attacker can exploit this to cause a denial of service condition. (CVE-2016-5357)\n\n - An integer overflow condition exists in the WBXML dissector. A remote attacker can exploit this, via a specially crafted packet or trace file, to exhaust CPU resources, resulting in a denial of service condition.\n (CVE-2016-5359)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-06-24T00:00:00", "type": "nessus", "title": "Wireshark 1.12.x < 1.12.12 Multiple DoS", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-5350", "CVE-2016-5351", "CVE-2016-5353", "CVE-2016-5354", "CVE-2016-5355", "CVE-2016-5356", "CVE-2016-5357", "CVE-2016-5359"], "modified": "2023-03-09T00:00:00", "cpe": ["cpe:/a:wireshark:wireshark"], "id": "WIRESHARK_1_12_12.NASL", "href": "https://www.tenable.com/plugins/nessus/91820", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(91820);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/03/09\");\n\n script_cve_id(\n \"CVE-2016-5350\",\n \"CVE-2016-5351\",\n \"CVE-2016-5353\",\n \"CVE-2016-5354\",\n \"CVE-2016-5355\",\n \"CVE-2016-5356\",\n \"CVE-2016-5357\",\n \"CVE-2016-5359\"\n );\n\n script_name(english:\"Wireshark 1.12.x < 1.12.12 Multiple DoS\");\n script_summary(english:\"Checks the version of Wireshark.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host has an application installed that is affected\nby multiple denial of service vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Wireshark installed on the remote Windows host is\n1.12.x prior to 1.12.12. It is, therefore, affected by multiple denial\nof service vulnerabilities :\n\n - An infinite loop exists in the SPOOLs dissector. A\n remote attacker, via a specially crafted packet or trace\n file, can exploit this to exhaust CPU resources,\n resulting in a denial of service condition.\n (CVE-2016-5350)\n\n - A flaw exists in the IEEE 802.11 dissector that is\n triggered when handling a malformed packet or trace\n file. A remote attacker can exploit this to cause a\n denial of service condition. (CVE-2016-5351)\n\n - A flaw exists in the UMTS FP dissector that is triggered\n when handling a malformed packet or trace file. A remote\n attacker can exploit this to cause a denial of service\n condition. (CVE-2016-5353)\n\n - A flaw exists in multiple USB dissectors that is\n triggered when a handling malformed packet or trace\n file. A remote attacker can exploit this to cause a\n denial of service condition. (CVE-2016-5354)\n\n - A flaw exists in the Toshiba file parser that is\n triggered when handling a malformed packet trace file. A\n remote attacker can exploit this, by convincing a user\n to open a specially crafted packet trace file, to cause\n a denial of service condition. (CVE-2016-5355)\n\n - A flaw exists in the CoSine file parser that is\n triggered when handling a malformed packet trace file. A\n remote attacker can exploit this to cause a denial of\n service condition. (CVE-2016-5356)\n\n - A flaw exists in the NetScreen file parser that is\n triggered when handling a malformed packet trace file. A\n remote attacker can exploit this to cause a denial of\n service condition. (CVE-2016-5357)\n\n - An integer overflow condition exists in the WBXML\n dissector. A remote attacker can exploit this, via a\n specially crafted packet or trace file, to exhaust CPU\n resources, resulting in a denial of service condition.\n (CVE-2016-5359)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-29.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-30.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-32.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-33.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-34.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-35.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-36.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-38.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/docs/relnotes/wireshark-1.12.12.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Wireshark version 1.12.12 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-5359\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/03/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/06/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/06/24\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:wireshark:wireshark\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"wireshark_installed.nasl\");\n script_require_keys(\"installed_sw/Wireshark\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\nget_kb_item_or_exit('SMB/Registry/Enumerated');\n\nvar app_info = vcf::get_app_info(app:'Wireshark', win_local:TRUE);\n\nvar constraints = [\n { 'min_version' : '1.12.0', 'max_version' : '1.12.11', 'fixed_version' : '1.12.12' }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-03-01T14:23:30", "description": "The following vulnerabilities have been discovered in the Wheezy's Wireshark version :\n\nCVE-2016-5350\n\nThe SPOOLS dissector could go into an infinite loop\n\nCVE-2016-5351\n\nThe IEEE 802.11 dissector could crash\n\nCVE-2016-5353\n\nThe UMTS FP dissector could crash\n\nCVE-2016-5354\n\nSome USB dissectors could crash\n\nCVE-2016-5355\n\nThe Toshiba file parser could crash\n\nCVE-2016-5356\n\nThe CoSine file parser could crash\n\nCVE-2016-5357\n\nThe NetScreen file parser could crash\n\nCVE-2016-5359\n\nThe WBXML dissector could go into an infinite loop\n\nFor Debian 7 'Wheezy', these problems have been fixed in version 1.12.1+g01b65bf-4+deb8u6~deb7u2.\n\nWe recommend that you upgrade your wireshark packages.\n\nNOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-07-01T00:00:00", "type": "nessus", "title": "Debian DLA-538-1 : wireshark security update", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-5350", "CVE-2016-5351", "CVE-2016-5353", "CVE-2016-5354", "CVE-2016-5355", "CVE-2016-5356", "CVE-2016-5357", "CVE-2016-5359"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:libwireshark-data", "p-cpe:/a:debian:debian_linux:libwireshark-dev", "p-cpe:/a:debian:debian_linux:libwireshark2", "p-cpe:/a:debian:debian_linux:libwiretap-dev", "p-cpe:/a:debian:debian_linux:libwiretap2", "p-cpe:/a:debian:debian_linux:libwsutil-dev", "p-cpe:/a:debian:debian_linux:libwsutil2", "p-cpe:/a:debian:debian_linux:tshark", "p-cpe:/a:debian:debian_linux:wireshark", "p-cpe:/a:debian:debian_linux:wireshark-common", "p-cpe:/a:debian:debian_linux:wireshark-dbg", "p-cpe:/a:debian:debian_linux:wireshark-dev", "p-cpe:/a:debian:debian_linux:wireshark-doc", "cpe:/o:debian:debian_linux:7.0"], "id": "DEBIAN_DLA-538.NASL", "href": "https://www.tenable.com/plugins/nessus/91905", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-538-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(91905);\n script_version(\"2.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-5350\", \"CVE-2016-5351\", \"CVE-2016-5353\", \"CVE-2016-5354\", \"CVE-2016-5355\", \"CVE-2016-5356\", \"CVE-2016-5357\", \"CVE-2016-5359\");\n\n script_name(english:\"Debian DLA-538-1 : wireshark security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The following vulnerabilities have been discovered in the Wheezy's\nWireshark version :\n\nCVE-2016-5350\n\nThe SPOOLS dissector could go into an infinite loop\n\nCVE-2016-5351\n\nThe IEEE 802.11 dissector could crash\n\nCVE-2016-5353\n\nThe UMTS FP dissector could crash\n\nCVE-2016-5354\n\nSome USB dissectors could crash\n\nCVE-2016-5355\n\nThe Toshiba file parser could crash\n\nCVE-2016-5356\n\nThe CoSine file parser could crash\n\nCVE-2016-5357\n\nThe NetScreen file parser could crash\n\nCVE-2016-5359\n\nThe WBXML dissector could go into an infinite loop\n\nFor Debian 7 'Wheezy', these problems have been fixed in version\n1.12.1+g01b65bf-4+deb8u6~deb7u2.\n\nWe recommend that you upgrade your wireshark packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2016/06/msg00039.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/wireshark\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwireshark-data\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwireshark-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwireshark2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwiretap-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwiretap2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwsutil-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwsutil2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:tshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/06/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/07/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark-data\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark2\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwiretap-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwiretap2\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwsutil-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwsutil2\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"tshark\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-common\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-dbg\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-doc\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-03-15T14:12:02", "description": "Multiple vulnerabilities were discovered in the dissectors/parsers for PKTC, IAX2, GSM CBCH and NCP, SPOOLS, IEEE 802.11, UMTS FP, USB, Toshiba, CoSine, NetScreen, WBXML which could result in denial of service or potentially the execution of arbitrary code.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-07-05T00:00:00", "type": "nessus", "title": "Debian DSA-3615-1 : wireshark - security update", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-5350", "CVE-2016-5351", "CVE-2016-5353", "CVE-2016-5354", "CVE-2016-5355", "CVE-2016-5356", "CVE-2016-5357", "CVE-2016-5359"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:wireshark", "cpe:/o:debian:debian_linux:8.0"], "id": "DEBIAN_DSA-3615.NASL", "href": "https://www.tenable.com/plugins/nessus/91926", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3615. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(91926);\n script_version(\"2.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-5350\", \"CVE-2016-5351\", \"CVE-2016-5353\", \"CVE-2016-5354\", \"CVE-2016-5355\", \"CVE-2016-5356\", \"CVE-2016-5357\", \"CVE-2016-5359\");\n script_xref(name:\"DSA\", value:\"3615\");\n\n script_name(english:\"Debian DSA-3615-1 : wireshark - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities were discovered in the dissectors/parsers for\nPKTC, IAX2, GSM CBCH and NCP, SPOOLS, IEEE 802.11, UMTS FP, USB,\nToshiba, CoSine, NetScreen, WBXML which could result in denial of\nservice or potentially the execution of arbitrary code.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/wireshark\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2016/dsa-3615\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the wireshark packages.\n\nFor the stable distribution (jessie), these problems have been fixed\nin version 1.12.1+g01b65bf-4+deb8u7.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/07/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/07/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark-data\", reference:\"1.12.1+g01b65bf-4+deb8u7\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u7\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark5\", reference:\"1.12.1+g01b65bf-4+deb8u7\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwiretap-dev\", reference:\"1.12.1+g01b65bf-4+deb8u7\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwiretap4\", reference:\"1.12.1+g01b65bf-4+deb8u7\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwsutil-dev\", reference:\"1.12.1+g01b65bf-4+deb8u7\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwsutil4\", reference:\"1.12.1+g01b65bf-4+deb8u7\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"tshark\", reference:\"1.12.1+g01b65bf-4+deb8u7\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark\", reference:\"1.12.1+g01b65bf-4+deb8u7\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-common\", reference:\"1.12.1+g01b65bf-4+deb8u7\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-dbg\", reference:\"1.12.1+g01b65bf-4+deb8u7\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u7\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-doc\", reference:\"1.12.1+g01b65bf-4+deb8u7\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-qt\", reference:\"1.12.1+g01b65bf-4+deb8u7\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-01-11T16:34:22", "description": "The version of Wireshark installed on the remote Mac OS X host is 2.0.x prior to 2.0.2. It is, therefore, affected by multiple vulnerabilities in the following components, which can result in a memory disclosure, a denial of service, or the execution of arbitrary code :\n\n - 3GPP TS 32.423 Trace file parser\n - ASN.1 BER dissector\n - DNP dissector\n - GSM A-bis OML dissector\n - HiQnet dissector\n - HTTP/2 dissector\n - IEEE 802.11 dissector\n - iSeries file parser\n - Ixia IxVeriWave file parser\n - LBMC dissector\n - LLRP dissector\n - NFS dissector\n - RSL dissector\n - SPICE dissector\n - X.509AF dissector\n\nAdditionally, a flaw related to how dynamic-link library (DLL) files are located and loaded exists in the ui/qt/wireshark_application.cpp file due to the application using a DLL search path that may include directories that are not trusted or under the user's control. A local attacker can exploit this issue, via a crafted DLL file injected into the search path, to execute arbitrary code with the privileges of the user running the application.\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2016-03-03T00:00:00", "type": "nessus", "title": "Wireshark 2.0.x < 2.0.2 Multiple Vulnerabilities (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-2521", "CVE-2016-2522", "CVE-2016-2523", "CVE-2016-2524", "CVE-2016-2525", "CVE-2016-2526", "CVE-2016-2527", "CVE-2016-2528", "CVE-2016-2529", "CVE-2016-2530", "CVE-2016-2531", "CVE-2016-2532"], "modified": "2019-11-20T00:00:00", "cpe": ["cpe:/a:wireshark:wireshark"], "id": "MACOSX_WIRESHARK_2_0_2.NASL", "href": "https://www.tenable.com/plugins/nessus/89102", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(89102);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/11/20\");\n\n script_cve_id(\n \"CVE-2016-2521\",\n \"CVE-2016-2522\",\n \"CVE-2016-2523\",\n \"CVE-2016-2524\",\n \"CVE-2016-2525\",\n \"CVE-2016-2526\",\n \"CVE-2016-2527\",\n \"CVE-2016-2528\",\n \"CVE-2016-2529\",\n \"CVE-2016-2530\",\n \"CVE-2016-2531\",\n \"CVE-2016-2532\"\n );\n script_xref(name:\"EDB-ID\", value:\"38996\");\n script_xref(name:\"EDB-ID\", value:\"39490\");\n\n script_name(english:\"Wireshark 2.0.x < 2.0.2 Multiple Vulnerabilities (Mac OS X)\");\n script_summary(english:\"Checks the version of Wireshark.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host has an application installed that is affected\nby multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Wireshark installed on the remote Mac OS X host is\n2.0.x prior to 2.0.2. It is, therefore, affected by multiple\nvulnerabilities in the following components, which can result in a\nmemory disclosure, a denial of service, or the execution of arbitrary\ncode :\n\n - 3GPP TS 32.423 Trace file parser\n - ASN.1 BER dissector\n - DNP dissector\n - GSM A-bis OML dissector\n - HiQnet dissector\n - HTTP/2 dissector\n - IEEE 802.11 dissector\n - iSeries file parser\n - Ixia IxVeriWave file parser\n - LBMC dissector\n - LLRP dissector\n - NFS dissector\n - RSL dissector\n - SPICE dissector\n - X.509AF dissector\n\nAdditionally, a flaw related to how dynamic-link library (DLL) files\nare located and loaded exists in the ui/qt/wireshark_application.cpp\nfile due to the application using a DLL search path that may include\ndirectories that are not trusted or under the user's control. A local\nattacker can exploit this issue, via a crafted DLL file injected into\nthe search path, to execute arbitrary code with the privileges of the\nuser running the application.\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/docs/relnotes/wireshark-2.0.2.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Wireshark version 2.0.2 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-2521\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/12/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/02/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/03/03\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:wireshark:wireshark\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_wireshark_installed.nbin\");\n script_require_keys(\"installed_sw/Wireshark\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nget_kb_item_or_exit(\"Host/MacOSX/Version\");\n\napp_name = \"Wireshark\";\ninstall = get_single_install(app_name:app_name, exit_if_unknown_ver:TRUE);\nversion = install['version'];\npath = install['path'];\n\nfixed_version = \"2.0.2\";\n\n# Affected :\n# 2.0.x < 2.0.2\nif (version !~ \"^2\\.0\\.[01]($|[^0-9])\")\n audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);\n\nreport =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fixed_version +\n '\\n';\n\nsecurity_report_v4(port:0, severity:SECURITY_HOLE, extra:report);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T12:40:08", "description": "Multiple vulnerabilities were discovered in the dissectors for H.225, Catapult DCT2000, UMTS FP and IPMI, which could result in denial of service or the execution of arbitrary code.", "cvss3": {}, "published": "2016-09-21T00:00:00", "type": "nessus", "title": "Debian DSA-3671-1 : wireshark - security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-7176", "CVE-2016-7177", "CVE-2016-7178", "CVE-2016-7179", "CVE-2016-7180"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:wireshark", "cpe:/o:debian:debian_linux:8.0"], "id": "DEBIAN_DSA-3671.NASL", "href": "https://www.tenable.com/plugins/nessus/93613", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3671. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(93613);\n script_version(\"2.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-7176\", \"CVE-2016-7177\", \"CVE-2016-7178\", \"CVE-2016-7179\", \"CVE-2016-7180\");\n script_xref(name:\"DSA\", value:\"3671\");\n\n script_name(english:\"Debian DSA-3671-1 : wireshark - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities were discovered in the dissectors for H.225,\nCatapult DCT2000, UMTS FP and IPMI, which could result in denial of\nservice or the execution of arbitrary code.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/wireshark\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2016/dsa-3671\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the wireshark packages.\n\nFor the stable distribution (jessie), these problems have been fixed\nin version 1.12.1+g01b65bf-4+deb8u9.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/09/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/09/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark-data\", reference:\"1.12.1+g01b65bf-4+deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwireshark5\", reference:\"1.12.1+g01b65bf-4+deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwiretap-dev\", reference:\"1.12.1+g01b65bf-4+deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwiretap4\", reference:\"1.12.1+g01b65bf-4+deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwsutil-dev\", reference:\"1.12.1+g01b65bf-4+deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libwsutil4\", reference:\"1.12.1+g01b65bf-4+deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"tshark\", reference:\"1.12.1+g01b65bf-4+deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark\", reference:\"1.12.1+g01b65bf-4+deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-common\", reference:\"1.12.1+g01b65bf-4+deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-dbg\", reference:\"1.12.1+g01b65bf-4+deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-doc\", reference:\"1.12.1+g01b65bf-4+deb8u9\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"wireshark-qt\", reference:\"1.12.1+g01b65bf-4+deb8u9\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T12:39:53", "description": "Multiple vulnerabilities were discovered in the dissectors for H.225, Catapult DCT2000, UMTS FP and IPMI, which could result in denial of service or the execution of arbitrary code.\n\nFor Debian 7 'Wheezy', these problems have been fixed in version 1.12.1+g01b65bf-4+deb8u6~deb7u4.\n\nWe recommend that you upgrade your wireshark packages.\n\nNOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2016-09-22T00:00:00", "type": "nessus", "title": "Debian DLA-632-1 : wireshark security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-7176", "CVE-2016-7177", "CVE-2016-7178", "CVE-2016-7179", "CVE-2016-7180"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:libwireshark-data", "p-cpe:/a:debian:debian_linux:libwireshark-dev", "p-cpe:/a:debian:debian_linux:libwireshark2", "p-cpe:/a:debian:debian_linux:libwiretap-dev", "p-cpe:/a:debian:debian_linux:libwiretap2", "p-cpe:/a:debian:debian_linux:libwsutil-dev", "p-cpe:/a:debian:debian_linux:libwsutil2", "p-cpe:/a:debian:debian_linux:tshark", "p-cpe:/a:debian:debian_linux:wireshark", "p-cpe:/a:debian:debian_linux:wireshark-common", "p-cpe:/a:debian:debian_linux:wireshark-dbg", "p-cpe:/a:debian:debian_linux:wireshark-dev", "p-cpe:/a:debian:debian_linux:wireshark-doc", "cpe:/o:debian:debian_linux:7.0"], "id": "DEBIAN_DLA-632.NASL", "href": "https://www.tenable.com/plugins/nessus/93620", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-632-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(93620);\n script_version(\"2.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-7176\", \"CVE-2016-7177\", \"CVE-2016-7178\", \"CVE-2016-7179\", \"CVE-2016-7180\");\n\n script_name(english:\"Debian DLA-632-1 : wireshark security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities were discovered in the dissectors for H.225,\nCatapult DCT2000, UMTS FP and IPMI, which could result in denial of\nservice or the execution of arbitrary code.\n\nFor Debian 7 'Wheezy', these problems have been fixed in version\n1.12.1+g01b65bf-4+deb8u6~deb7u4.\n\nWe recommend that you upgrade your wireshark packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2016/09/msg00025.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/wireshark\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwireshark-data\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwireshark-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwireshark2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwiretap-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwiretap2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwsutil-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libwsutil2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:tshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wireshark-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/09/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/09/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark-data\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwireshark2\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwiretap-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwiretap2\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwsutil-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libwsutil2\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"tshark\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-common\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-dbg\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-dev\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"wireshark-doc\", reference:\"1.12.1+g01b65bf-4+deb8u6~deb7u4\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-01-26T14:20:39", "description": "The version of Wireshark installed on the remote Windows host is 2.0.x prior to 2.0.5. It is, therefore, affected by multiple denial of service vulnerabilities :\n\n - A denial of service vulnerability exists in the CORBA IDL dissector due to improper handling of packets. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause an application crash. Note that this vulnerability only affects 64-bit versions of Windows. (CVE-2016-6503)\n\n - A denial of service vulnerability exists due to a divide-by-zero flaw in the dissect_pbb_tlvblock() function in packet-packetbb.c. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause an application crash. (CVE-2016-6505)\n\n - A flaw exists in the add_headers() function in packet_wsp.c that is triggered when an offset of zero is returned by the wkh_content_disposition() function. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause an infinite loop, resulting in a denial of service condition. (CVE-2016-6506)\n\n - A denial of service vulnerability exists due to an incorrect integer data type used in the rlc_decode_li() function in packet-rlc.c. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a long loop and excessive CPU resource consumption, resulting in a denial of service condition. (CVE-2016-6508)\n\n - A denial of service vulnerability exists in the dissect_ldss_transfer() function in packet-ldss.c that is triggered when recreating a conversation that already exists. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause an application crash. (CVE-2016-6509)\n\n - An overflow condition exists in the rlc_decode_li() function in packet-rlc.c due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a stack-based buffer overflow, resulting in a denial of service condition.\n (CVE-2016-6510)\n\n - A denial of service vulnerability exists in the proto_tree_add_text_valist_internal() function in proto.c due to improper handling of packets. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a long loop and excessive CPU resource consumption.\n (CVE-2016-6511)\n\n - Multiple flaws exist in the MMSE, WAP, WBXML, and WSP dissectors due to improper handling of packets. An unauthenticated, remote attacker can exploit these issues, via a specially crafted packet or packet trace file, to cause an infinite loop, resulting in a denial of service condition. (CVE-2016-6512)\n\n - A denial of service vulnerability exists in the parse_wbxml_tag_defined() function in packet-wbxml.c due to improper handling of packets. An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause an application crash. (CVE-2016-6513)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2016-08-09T00:00:00", "type": "nessus", "title": "Wireshark 2.0.x < 2.0.5 Multiple DoS", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-6503", "CVE-2016-6505", "CVE-2016-6506", "CVE-2016-6508", "CVE-2016-6509", "CVE-2016-6510", "CVE-2016-6511", "CVE-2016-6512", "CVE-2016-6513"], "modified": "2019-11-14T00:00:00", "cpe": ["cpe:/a:wireshark:wireshark"], "id": "WIRESHARK_2_0_5.NASL", "href": "https://www.tenable.com/plugins/nessus/92817", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(92817);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/14\");\n\n script_cve_id(\n \"CVE-2016-6503\",\n \"CVE-2016-6505\",\n \"CVE-2016-6506\",\n \"CVE-2016-6508\",\n \"CVE-2016-6509\",\n \"CVE-2016-6510\",\n \"CVE-2016-6511\",\n \"CVE-2016-6512\",\n \"CVE-2016-6513\"\n );\n script_bugtraq_id(\n 92162,\n 92163,\n 92165,\n 92166,\n 92168,\n 92169,\n 92172,\n 92173,\n 92174\n );\n script_xref(name:\"EDB-ID\", value:\"40195\");\n script_xref(name:\"EDB-ID\", value:\"40196\");\n script_xref(name:\"EDB-ID\", value:\"40197\");\n script_xref(name:\"EDB-ID\", value:\"40198\");\n script_xref(name:\"EDB-ID\", value:\"40199\");\n\n script_name(english:\"Wireshark 2.0.x < 2.0.5 Multiple DoS\");\n script_summary(english:\"Checks the version of Wireshark.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host has an application installed that is affected\nby multiple denial of service vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Wireshark installed on the remote Windows host is 2.0.x\nprior to 2.0.5. It is, therefore, affected by multiple denial of\nservice vulnerabilities :\n\n - A denial of service vulnerability exists in the CORBA\n IDL dissector due to improper handling of packets. An\n unauthenticated, remote attacker can exploit this, via a\n specially crafted packet or packet trace file, to cause\n an application crash. Note that this vulnerability only\n affects 64-bit versions of Windows. (CVE-2016-6503)\n\n - A denial of service vulnerability exists due to a\n divide-by-zero flaw in the dissect_pbb_tlvblock()\n function in packet-packetbb.c. An unauthenticated,\n remote attacker can exploit this, via a specially\n crafted packet or packet trace file, to cause an\n application crash. (CVE-2016-6505)\n\n - A flaw exists in the add_headers() function in\n packet_wsp.c that is triggered when an offset of zero is\n returned by the wkh_content_disposition() function. An\n unauthenticated, remote attacker can exploit this, via a \n specially crafted packet or packet trace file, to cause\n an infinite loop, resulting in a denial of service\n condition. (CVE-2016-6506)\n\n - A denial of service vulnerability exists due to an\n incorrect integer data type used in the rlc_decode_li()\n function in packet-rlc.c. An unauthenticated, remote\n attacker can exploit this, via a specially crafted\n packet or packet trace file, to cause a long loop and\n excessive CPU resource consumption, resulting in a\n denial of service condition. (CVE-2016-6508)\n\n - A denial of service vulnerability exists in the\n dissect_ldss_transfer() function in packet-ldss.c that\n is triggered when recreating a conversation that already\n exists. An unauthenticated, remote attacker can exploit\n this, via a specially crafted packet or packet trace\n file, to cause an application crash. (CVE-2016-6509)\n\n - An overflow condition exists in the rlc_decode_li()\n function in packet-rlc.c due to improper validation of\n user-supplied input. An unauthenticated, remote attacker\n can exploit this, via a specially crafted packet or\n packet trace file, to cause a stack-based buffer\n overflow, resulting in a denial of service condition.\n (CVE-2016-6510)\n\n - A denial of service vulnerability exists in the\n proto_tree_add_text_valist_internal() function in\n proto.c due to improper handling of packets. An\n unauthenticated, remote attacker can exploit this, via a\n specially crafted packet or packet trace file, to cause\n a long loop and excessive CPU resource consumption.\n (CVE-2016-6511)\n\n - Multiple flaws exist in the MMSE, WAP, WBXML, and WSP\n dissectors due to improper handling of packets. An\n unauthenticated, remote attacker can exploit these\n issues, via a specially crafted packet or packet trace\n file, to cause an infinite loop, resulting in a denial\n of service condition. (CVE-2016-6512)\n\n - A denial of service vulnerability exists in the\n parse_wbxml_tag_defined() function in packet-wbxml.c due\n to improper handling of packets. An unauthenticated,\n remote attacker can exploit this, via a specially\n crafted packet or packet trace file, to cause an\n application crash. (CVE-2016-6513)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-39.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-41.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-42.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-44.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-45.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-46.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-47.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-48.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-49.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.wireshark.org/docs/relnotes/wireshark-2.0.5.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Wireshark version 2.0.5 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-6513\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/07/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/07/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:wireshark:wireshark\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"wireshark_installed.nasl\");\n script_require_keys(\"installed_sw/Wireshark\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\n\napp_name = \"Wireshark\";\ninstall = get_single_install(app_name:app_name, exit_if_unknown_ver:TRUE);\nversion = install['version'];\npath = install['path'];\nfix = '2.0.5';\n\nif(version !~ \"^2\\.0\\.\")\n exit(0, \"The remote installation of Wireshark is not 2.0.x.\");\n\n# Affected :\n# 2.0.x < 2.0.5\nif (version !~ \"^2\\.0\\.[0-4]($|[^0-9])\")\n audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);\n\nport = get_kb_item(\"SMB/transport\");\nif (!port) port = 445;\n\nreport =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n\nsecurity_report_v4(port:port, severity:SECURITY_WARNING, extra:report);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-02-10T14:50:54", "description": "According to the version of the wireshark packages installed, the EulerOS installation on the remote host is affected by the following vulnerability :\n\n - In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Radiotap dissector could crash. This was addressed in epan/dissectors/packet-ieee80211-radiotap-iter.c by validating iterator operations.(CVE-2018-16057)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-10-30T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP5 : wireshark (EulerOS-SA-2020-2275)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-16057"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:wireshark", "p-cpe:/a:huawei:euleros:wireshark-gnome", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2020-2275.NASL", "href": "https://www.tenable.com/plugins/nessus/142123", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(142123);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2018-16057\"\n );\n\n script_name(english:\"EulerOS 2.0 SP5 : wireshark (EulerOS-SA-2020-2275)\");\n script_summary(english:\"Checks the rpm output for the updated package.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the version of the wireshark packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerability :\n\n - In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0\n to 2.2.16, the Radiotap dissector could crash. This was\n addressed in\n epan/dissectors/packet-ieee80211-radiotap-iter.c by\n validating iterator operations.(CVE-2018-16057)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-2275\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?85b8c1b6\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected wireshark package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/10/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/10/30\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:wireshark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:wireshark-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(5)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"wireshark-1.10.14-14.h5.eulerosv2r7\",\n \"wireshark-gnome-1.10.14-14.h5.eulerosv2r7\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"5\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wireshark\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "openvas": [{"lastseen": "2019-05-29T18:35:11", "description": "This host is installed with Wireshark\n and is prone to multiple denial of service vulnerabilities.", "cvss3": {}, "published": "2016-01-11T00:00:00", "type": "openvas", "title": "Wireshark Multiple Denial-of-Service Vulnerabilities-03 January16 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-8713", "CVE-2015-8717", "CVE-2015-8714", "CVE-2015-8719", "CVE-2015-8715", "CVE-2015-8712", "CVE-2015-8716"], "modified": "2018-10-18T00:00:00", "id": "OPENVAS:1361412562310806948", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806948", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_wireshark_mult_dos_vuln03_jan16_macosx.nasl 11969 2018-10-18 14:53:42Z asteins $\n#\n# Wireshark Multiple Denial-of-Service Vulnerabilities-03 January16 (Mac OS X)\n#\n# Authors:\n# Tushar Khelge <ktushar@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:wireshark:wireshark\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806948\");\n script_version(\"$Revision: 11969 $\");\n script_cve_id(\"CVE-2015-8716\", \"CVE-2015-8715\", \"CVE-2015-8714\", \"CVE-2015-8713\",\n \"CVE-2015-8719\", \"CVE-2015-8717\", \"CVE-2015-8712\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-18 16:53:42 +0200 (Thu, 18 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2016-01-11 11:59:19 +0530 (Mon, 11 Jan 2016)\");\n script_name(\"Wireshark Multiple Denial-of-Service Vulnerabilities-03 January16 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Wireshark\n and is prone to multiple denial of service vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to\n\n - 'init_t38_info_conv' function in 'epan/dissectors/packet-t38.c'\n script in the T.38 dissector does not ensure that a conversation exists.\n\n - 'epan/dissectors/packet-alljoyn.c' in the AllJoyn dissector\n does not check for empty arguments.\n\n - 'dissect_dcom_OBJREF' function in 'epan/dissectors/packet-dcom.c'\n script in the DCOM dissecto does not initialize a certain IPv4 data structure.\n\n - 'epan/dissectors/packet-umts_fp.c' script in the UMTS FP dissector\n does not properly reserve memory for channel ID mappings.\n\n - 'dissect_dns_answer' function in 'epan/dissectors/packet-dns.c'\n script in the DNS dissector mishandles the EDNS0 Client Subnet option.\n\n - 'dissect_sdp' function in 'epan/dissectors/packet-sdp.c' script\n in the SDP dissector does not prevent use of a negative media count.\n\n - 'dissect_hsdsch_channel_info' function in 'epan/dissectors/packet-umts_fp.c'\n script in the UMTS FP dissector does not validate the number of PDUs.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to conduct denial of service attack.\");\n\n script_tag(name:\"affected\", value:\"Wireshark version 1.12.x before 1.12.9\n on Mac OS X\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Wireshark version 1.12.9 or\n later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"http://www.wireshark.org/security/wnpa-sec-2015-33.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2015-32.html\");\n script_xref(name:\"URL\", value:\"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9887\");\n script_xref(name:\"URL\", value:\"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11607\");\n\n script_category(ACT_GATHER_INFO);\n script_family(\"Denial of Service\");\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_dependencies(\"gb_wireshark_detect_macosx.nasl\");\n script_mandatory_keys(\"Wireshark/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!wirversion = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(version:wirversion, test_version:\"1.12.0\", test_version2:\"1.12.8\"))\n{\n report = 'Installed Version: ' + wirversion + '\\n' +\n 'Fixed Version: 1.12.9 \\n';\n security_message(data:report);\n exit(0);\n}\n\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-07-17T14:25:27", "description": "This host is installed with Wireshark\n and is prone to multiple denial of service vulnerabilities.", "cvss3": {}, "published": "2016-01-11T00:00:00", "type": "openvas", "title": "Wireshark Multiple Denial-of-Service Vulnerabilities-03 January16 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-8713", "CVE-2015-8717", "CVE-2015-8714", "CVE-2015-8719", "CVE-2015-8715", "CVE-2015-8712", "CVE-2015-8716"], "modified": "2019-07-05T00:00:00", "id": "OPENVAS:1361412562310806947", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806947", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Wireshark Multiple Denial-of-Service Vulnerabilities-03 January16 (Windows)\n#\n# Authors:\n# Tushar Khelge <ktushar@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:wireshark:wireshark\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806947\");\n script_version(\"2019-07-05T09:12:25+0000\");\n script_cve_id(\"CVE-2015-8716\", \"CVE-2015-8715\", \"CVE-2015-8714\", \"CVE-2015-8713\",\n \"CVE-2015-8719\", \"CVE-2015-8717\", \"CVE-2015-8712\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 09:12:25 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2016-01-11 11:59:19 +0530 (Mon, 11 Jan 2016)\");\n script_name(\"Wireshark Multiple Denial-of-Service Vulnerabilities-03 January16 (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Wireshark\n and is prone to multiple denial of service vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to\n\n - 'init_t38_info_conv' function in 'epan/dissectors/packet-t38.c'\n script in the T.38 dissector does not ensure that a conversation exists.\n\n - 'epan/dissectors/packet-alljoyn.c' in the AllJoyn dissector\n does not check for empty arguments.\n\n - 'dissect_dcom_OBJREF' function in 'epan/dissectors/packet-dcom.c'\n script in the DCOM dissecto does not initialize a certain IPv4 data structure.\n\n - 'epan/dissectors/packet-umts_fp.c' script in the UMTS FP dissector\n does not properly reserve memory for channel ID mappings.\n\n - 'dissect_dns_answer' function in 'epan/dissectors/packet-dns.c'\n script in the DNS dissector mishandles the EDNS0 Client Subnet option.\n\n - 'dissect_sdp' function in 'epan/dissectors/packet-sdp.c' script\n in the SDP dissector does not prevent use of a negative media count.\n\n - 'dissect_hsdsch_channel_info' function in 'epan/dissectors/packet-umts_fp.c'\n script in the UMTS FP dissector does not validate the number of PDUs.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to conduct denial of service attack.\");\n\n script_tag(name:\"affected\", value:\"Wireshark version 1.12.x before 1.12.9\n on Windows\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Wireshark version 1.12.9 or\n later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"http://www.wireshark.org/security/wnpa-sec-2015-33.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2015-32.html\");\n script_xref(name:\"URL\", value:\"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9887\");\n script_xref(name:\"URL\", value:\"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11607\");\n\n script_category(ACT_GATHER_INFO);\n script_family(\"Denial of Service\");\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_dependencies(\"gb_wireshark_detect_win.nasl\");\n script_mandatory_keys(\"Wireshark/Win/Ver\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!wirversion = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(version:wirversion, test_version:\"1.12.0\", test_version2:\"1.12.8\"))\n{\n report = 'Installed Version: ' + wirversion + '\\n' +\n 'Fixed Version: 1.12.9 \\n';\n security_message(data:report);\n exit(0);\n}\n\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2017-07-24T12:54:40", "description": "Multiple vulnerabilities were\ndiscovered in the dissectors/parsers for DNP, RSL, LLRP, GSM A-bis OML,\nASN 1 BER which could result in denial of service.", "cvss3": {}, "published": "2016-03-13T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3516-1 (wireshark - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-2531", "CVE-2016-2530", "CVE-2015-8731", "CVE-2016-2532", "CVE-2016-2523"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:703516", "href": "http://plugins.openvas.org/nasl.php?oid=703516", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3516.nasl 6608 2017-07-07 12:05:05Z cfischer $\n# Auto-generated from advisory DSA 3516-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703516);\n script_version(\"$Revision: 6608 $\");\n script_cve_id(\"CVE-2015-8731\", \"CVE-2016-2523\", \"CVE-2016-2530\", \"CVE-2016-2531\",\n \"CVE-2016-2532\");\n script_name(\"Debian Security Advisory DSA 3516-1 (wireshark - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:05 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2016-03-13 00:00:00 +0100 (Sun, 13 Mar 2016)\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2016/dsa-3516.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"wireshark on Debian Linux\");\n script_tag(name: \"insight\", value: \"Wireshark is a network 'sniffer' -\na tool that captures and analyzes packets off the wire. Wireshark can decode\ntoo many protocols to list here.\");\n script_tag(name: \"solution\", value: \"For the oldstable distribution (wheezy),\nthese problems have been fixed in version 1.8.2-5wheezy18.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 1.12.1+g01b65bf-4+deb8u5.\n\nFor the testing distribution (stretch), these problems have been fixed\nin version 2.0.2+ga16e22e-1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 2.0.2+ga16e22e-1.\n\nWe recommend that you upgrade your wireshark packages.\");\n script_tag(name: \"summary\", value: \"Multiple vulnerabilities were\ndiscovered in the dissectors/parsers for DNP, RSL, LLRP, GSM A-bis OML,\nASN 1 BER which could result in denial of service.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed\nsoftware version using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"1.8.2-5wheezy18\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"1.8.2-5wheezy18\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark2:amd64\", ver:\"1.8.2-5wheezy18\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark2:i386\", ver:\"1.8.2-5wheezy18\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"1.8.2-5wheezy18\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap2:amd64\", ver:\"1.8.2-5wheezy18\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap2:i386\", ver:\"1.8.2-5wheezy18\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"1.8.2-5wheezy18\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil2:amd64\", ver:\"1.8.2-5wheezy18\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil2:i386\", ver:\"1.8.2-5wheezy18\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tshark\", ver:\"1.8.2-5wheezy18\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark\", ver:\"1.8.2-5wheezy18\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"1.8.2-5wheezy18\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dbg\", ver:\"1.8.2-5wheezy18\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"1.8.2-5wheezy18\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"1.8.2-5wheezy18\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark5:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark5:i386\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tshark\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dbg\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark6:amd64\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark6:i386\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap5:amd64\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap5:i386\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil6:amd64\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil6:i386\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tshark\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-gtk\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:35:43", "description": "Multiple vulnerabilities were\ndiscovered in the dissectors/parsers for DNP, RSL, LLRP, GSM A-bis OML,\nASN 1 BER which could result in denial of service.", "cvss3": {}, "published": "2016-03-13T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3516-1 (wireshark - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-2531", "CVE-2016-2530", "CVE-2015-8731", "CVE-2016-2532", "CVE-2016-2523"], "modified": "2019-03-18T00:00:00", "id": "OPENVAS:1361412562310703516", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703516", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3516.nasl 14279 2019-03-18 14:48:34Z cfischer $\n# Auto-generated from advisory DSA 3516-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703516\");\n script_version(\"$Revision: 14279 $\");\n script_cve_id(\"CVE-2015-8731\", \"CVE-2016-2523\", \"CVE-2016-2530\", \"CVE-2016-2531\",\n \"CVE-2016-2532\");\n script_name(\"Debian Security Advisory DSA 3516-1 (wireshark - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:48:34 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-03-13 00:00:00 +0100 (Sun, 13 Mar 2016)\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2016/dsa-3516.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(7|8|9)\");\n script_tag(name:\"affected\", value:\"wireshark on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the oldstable distribution (wheezy),\nthese problems have been fixed in version 1.8.2-5wheezy18.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 1.12.1+g01b65bf-4+deb8u5.\n\nFor the testing distribution (stretch), these problems have been fixed\nin version 2.0.2+ga16e22e-1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 2.0.2+ga16e22e-1.\n\nWe recommend that you upgrade your wireshark packages.\");\n script_tag(name:\"summary\", value:\"Multiple vulnerabilities were\ndiscovered in the dissectors/parsers for DNP, RSL, LLRP, GSM A-bis OML,\nASN 1 BER which could result in denial of service.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed\nsoftware version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"1.8.2-5wheezy18\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"1.8.2-5wheezy18\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark2:amd64\", ver:\"1.8.2-5wheezy18\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark2:i386\", ver:\"1.8.2-5wheezy18\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"1.8.2-5wheezy18\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap2:amd64\", ver:\"1.8.2-5wheezy18\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap2:i386\", ver:\"1.8.2-5wheezy18\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"1.8.2-5wheezy18\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil2:amd64\", ver:\"1.8.2-5wheezy18\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil2:i386\", ver:\"1.8.2-5wheezy18\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tshark\", ver:\"1.8.2-5wheezy18\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark\", ver:\"1.8.2-5wheezy18\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"1.8.2-5wheezy18\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dbg\", ver:\"1.8.2-5wheezy18\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"1.8.2-5wheezy18\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"1.8.2-5wheezy18\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark5:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark5:i386\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tshark\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dbg\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"1.12.1+g01b65bf-4+deb8u5\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark6:amd64\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark6:i386\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap5:amd64\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap5:i386\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil6:amd64\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil6:i386\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tshark\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-gtk\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:35:16", "description": "Multiple vulnerabilities were\ndiscovered in the dissectors/parsers for Pcapng, NBAP, UMTS FP, DCOM, AllJoyn,\nT.38, SDP, NLM, DNS, BED, SCTP, 802.11, DIAMETER, VeriWave, RVSP, ANSi A, GSM A,\nAscend, NBAP, ZigBee ZCL and Sniffer which could result in denial of service.", "cvss3": {}, "published": "2016-03-04T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3505-1 (wireshark - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-8713", "CVE-2015-8717", "CVE-2015-8730", "CVE-2015-8714", "CVE-2015-8733", "CVE-2015-8722", "CVE-2015-8719", "CVE-2015-8715", "CVE-2015-8726", "CVE-2015-8724", "CVE-2015-8723", "CVE-2015-8720", "CVE-2015-8725", "CVE-2015-8729", "CVE-2015-8721", "CVE-2015-8727", "CVE-2015-7830", "CVE-2015-8728", "CVE-2015-8712", "CVE-2015-8732", "CVE-2015-8716", "CVE-2015-8711", "CVE-2015-8718"], "modified": "2019-03-18T00:00:00", "id": "OPENVAS:1361412562310703505", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703505", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3505.nasl 14279 2019-03-18 14:48:34Z cfischer $\n# Auto-generated from advisory DSA 3505-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703505\");\n script_version(\"$Revision: 14279 $\");\n script_cve_id(\"CVE-2015-7830\", \"CVE-2015-8711\", \"CVE-2015-8712\", \"CVE-2015-8713\",\n \"CVE-2015-8714\", \"CVE-2015-8715\", \"CVE-2015-8716\", \"CVE-2015-8717\",\n \"CVE-2015-8718\", \"CVE-2015-8719\", \"CVE-2015-8720\", \"CVE-2015-8721\",\n \"CVE-2015-8722\", \"CVE-2015-8723\", \"CVE-2015-8724\", \"CVE-2015-8725\",\n \"CVE-2015-8726\", \"CVE-2015-8727\", \"CVE-2015-8728\", \"CVE-2015-8729\",\n \"CVE-2015-8730\", \"CVE-2015-8732\", \"CVE-2015-8733\");\n script_name(\"Debian Security Advisory DSA 3505-1 (wireshark - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:48:34 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-03-04 00:00:00 +0100 (Fri, 04 Mar 2016)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2016/dsa-3505.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(8|7|9)\");\n script_tag(name:\"affected\", value:\"wireshark on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the oldstable distribution (wheezy),\nthese problems have been fixed in version 1.8.2-5wheezy17.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 1.12.1+g01b65bf-4+deb8u4.\n\nFor the testing distribution (stretch), these problems have been fixed\nin version 2.0.2+ga16e22e-1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 2.0.2+ga16e22e-1.\n\nWe recommend that you upgrade your wireshark packages.\");\n script_tag(name:\"summary\", value:\"Multiple vulnerabilities were\ndiscovered in the dissectors/parsers for Pcapng, NBAP, UMTS FP, DCOM, AllJoyn,\nT.38, SDP, NLM, DNS, BED, SCTP, 802.11, DIAMETER, VeriWave, RVSP, ANSi A, GSM A,\nAscend, NBAP, ZigBee ZCL and Sniffer which could result in denial of service.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed\nsoftware version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark5:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark5:i386\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tshark\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dbg\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"1.8.2-5wheezy17\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"1.8.2-5wheezy17\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark2:amd64\", ver:\"1.8.2-5wheezy17\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark2:i386\", ver:\"1.8.2-5wheezy17\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"1.8.2-5wheezy17\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap2:amd64\", ver:\"1.8.2-5wheezy17\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap2:i386\", ver:\"1.8.2-5wheezy17\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"1.8.2-5wheezy17\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil2:amd64\", ver:\"1.8.2-5wheezy17\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil2:i386\", ver:\"1.8.2-5wheezy17\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tshark\", ver:\"1.8.2-5wheezy17\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark\", ver:\"1.8.2-5wheezy17\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"1.8.2-5wheezy17\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dbg\", ver:\"1.8.2-5wheezy17\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"1.8.2-5wheezy17\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"1.8.2-5wheezy17\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark6:amd64\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark6:i386\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap5:amd64\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap5:i386\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil6:amd64\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil6:i386\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tshark\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-gtk\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"2.0.2+ga16e22e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2017-07-24T12:54:14", "description": "Multiple vulnerabilities were\ndiscovered in the dissectors/parsers for Pcapng, NBAP, UMTS FP, DCOM, AllJoyn,\nT.38, SDP, NLM, DNS, BED, SCTP, 802.11, DIAMETER, VeriWave, RVSP, ANSi A, GSM A,\nAscend, NBAP, ZigBee ZCL and Sniffer which could result in denial of service.", "cvss3": {}, "published": "2016-03-04T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3505-1 (wireshark - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-8713", "CVE-2015-8717", "CVE-2015-8730", "CVE-2015-8714", "CVE-2015-8733", "CVE-2015-8722", "CVE-2015-8719", "CVE-2015-8715", "CVE-2015-8726", "CVE-2015-8724", "CVE-2015-8723", "CVE-2015-8720", "CVE-2015-8725", "CVE-2015-8729", "CVE-2015-8721", "CVE-2015-8727", "CVE-2015-7830", "CVE-2015-8728", "CVE-2015-8712", "CVE-2015-8732", "CVE-2015-8716", "CVE-2015-8711", "CVE-2015-8718"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:703505", "href": "http://plugins.openvas.org/nasl.php?oid=703505", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3505.nasl 6608 2017-07-07 12:05:05Z cfischer $\n# Auto-generated from advisory DSA 3505-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703505);\n script_version(\"$Revision: 6608 $\");\n script_cve_id(\"CVE-2015-7830\", \"CVE-2015-8711\", \"CVE-2015-8712\", \"CVE-2015-8713\",\n \"CVE-2015-8714\", \"CVE-2015-8715\", \"CVE-2015-8716\", \"CVE-2015-8717\",\n \"CVE-2015-8718\", \"CVE-2015-8719\", \"CVE-2015-8720\", \"CVE-2015-8721\",\n \"CVE-2015-8722\", \"CVE-2015-8723\", \"CVE-2015-8724\", \"CVE-2015-8725\",\n \"CVE-2015-8726\", \"CVE-2015-8727\", \"CVE-2015-8728\", \"CVE-2015-8729\",\n \"CVE-2015-8730\", \"CVE-2015-8732\", \"CVE-2015-8733\");\n script_name(\"Debian Security Advisory DSA 3505-1 (wireshark - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:05 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2016-03-04 00:00:00 +0100 (Fri, 04 Mar 2016)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2016/dsa-3505.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"wireshark on Debian Linux\");\n script_tag(name: \"insight\", value: \"Wireshark is a network 'sniffer' - a\ntool that captures and analyzes packets off the wire. Wireshark can decode too\nmany protocols to list here.\");\n script_tag(name: \"solution\", value: \"For the oldstable distribution (wheezy),\nthese problems have been fixed in version 1.8.2-5wheezy17.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 1.12.1+g01b65bf-4+deb8u4.\n\nFor the testing distribution (stretch), these problems have been fixed\nin version 2.0.2+ga16e22e-1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 2.0.2+ga16e22e-1.\n\nWe recommend that you upgrade your wireshark packages.\");\n script_tag(name: \"summary\", value: \"Multiple vulnerabilities were\ndiscovered in the dissectors/parsers for Pcapng, NBAP, UMTS FP, DCOM, AllJoyn,\nT.38, SDP, NLM, DNS, BED, SCTP, 802.11, DIAMETER, VeriWave, RVSP, ANSi A, GSM A,\nAscend, NBAP, ZigBee ZCL and Sniffer which could result in denial of service.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed\nsoftware version using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark5:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark5:i386\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tshark\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dbg\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"1.12.1+g01b65bf-4+deb8u4\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"1.8.2-5wheezy17\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"1.8.2-5wheezy17\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark2:amd64\", ver:\"1.8.2-5wheezy17\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark2:i386\", ver:\"1.8.2-5wheezy17\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"1.8.2-5wheezy17\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap2:amd64\", ver:\"1.8.2-5wheezy17\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap2:i386\", ver:\"1.8.2-5wheezy17\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"1.8.2-5wheezy17\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil2:amd64\", ver:\"1.8.2-5wheezy17\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil2:i386\", ver:\"1.8.2-5wheezy17\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tshark\", ver:\"1.8.2-5wheezy17\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark\", ver:\"1.8.2-5wheezy17\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"1.8.2-5wheezy17\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dbg\", ver:\"1.8.2-5wheezy17\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"1.8.2-5wheezy17\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"1.8.2-5wheezy17\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark6:amd64\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark6:i386\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap5:amd64\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap5:i386\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil6:amd64\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil6:i386\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tshark\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-gtk\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"2.0.2+ga16e22e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:35:41", "description": "Multiple vulnerabilities were discovered\nin the dissectors for NDS, PacketBB, WSP, MMSE, RLC, LDSS, RLC and OpenFlow, which\ncould result in denial of service or the execution of arbitrary code.", "cvss3": {}, "published": "2016-08-12T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3648-1 (wireshark - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-6505", "CVE-2016-6510", "CVE-2016-6504", "CVE-2016-6511", "CVE-2016-6508", "CVE-2016-6506", "CVE-2016-6509", "CVE-2016-6507"], "modified": "2019-03-18T00:00:00", "id": "OPENVAS:1361412562310703648", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703648", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3648.nasl 14279 2019-03-18 14:48:34Z cfischer $\n# Auto-generated from advisory DSA 3648-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703648\");\n script_version(\"$Revision: 14279 $\");\n script_cve_id(\"CVE-2016-6504\", \"CVE-2016-6505\", \"CVE-2016-6506\", \"CVE-2016-6507\",\n \"CVE-2016-6508\", \"CVE-2016-6509\", \"CVE-2016-6510\", \"CVE-2016-6511\");\n script_name(\"Debian Security Advisory DSA 3648-1 (wireshark - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:48:34 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-08-12 00:00:00 +0200 (Fri, 12 Aug 2016)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2016/dsa-3648.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(9|8)\");\n script_tag(name:\"affected\", value:\"wireshark on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (jessie),\nthese problems have been fixed in version 1.12.1+g01b65bf-4+deb8u8.\n\nFor the testing distribution (stretch), these problems have been fixed\nin version 2.0.5+ga3be9c6-1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 2.0.5+ga3be9c6-1.\n\nWe recommend that you upgrade your wireshark packages.\");\n script_tag(name:\"summary\", value:\"Multiple vulnerabilities were discovered\nin the dissectors for NDS, PacketBB, WSP, MMSE, RLC, LDSS, RLC and OpenFlow, which\ncould result in denial of service or the execution of arbitrary code.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software\nversion using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"2.0.5+ga3be9c6-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"2.0.5+ga3be9c6-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark6:amd64\", ver:\"2.0.5+ga3be9c6-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark6:i386\", ver:\"2.0.5+ga3be9c6-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"2.0.5+ga3be9c6-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap5:amd64\", ver:\"2.0.5+ga3be9c6-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap5:i386\", ver:\"2.0.5+ga3be9c6-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\n\nif((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"2.0.5+ga3be9c6-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil6:amd64\", ver:\"2.0.5+ga3be9c6-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil6:i386\", ver:\"2.0.5+ga3be9c6-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\n\nif((res = isdpkgvuln(pkg:\"tshark\", ver:\"2.0.5+ga3be9c6-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark\", ver:\"2.0.5+ga3be9c6-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"2.0.5+ga3be9c6-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"2.0.5+ga3be9c6-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"2.0.5+ga3be9c6-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-gtk\", ver:\"2.0.5+ga3be9c6-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"2.0.5+ga3be9c6-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark5:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark5:i386\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif((res = isdpkgvuln(pkg:\"tshark\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dbg\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2017-07-24T12:54:28", "description": "Multiple vulnerabilities were discovered\nin the dissectors for NDS, PacketBB, WSP, MMSE, RLC, LDSS, RLC and OpenFlow, which\ncould result in denial of service or the execution of arbitrary code.", "cvss3": {}, "published": "2016-08-12T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3648-1 (wireshark - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-6505", "CVE-2016-6510", "CVE-2016-6504", "CVE-2016-6511", "CVE-2016-6508", "CVE-2016-6506", "CVE-2016-6509", "CVE-2016-6507"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:703648", "href": "http://plugins.openvas.org/nasl.php?oid=703648", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3648.nasl 6608 2017-07-07 12:05:05Z cfischer $\n# Auto-generated from advisory DSA 3648-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703648);\n script_version(\"$Revision: 6608 $\");\n script_cve_id(\"CVE-2016-6504\", \"CVE-2016-6505\", \"CVE-2016-6506\", \"CVE-2016-6507\",\n \"CVE-2016-6508\", \"CVE-2016-6509\", \"CVE-2016-6510\", \"CVE-2016-6511\");\n script_name(\"Debian Security Advisory DSA 3648-1 (wireshark - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:05 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2016-08-12 00:00:00 +0200 (Fri, 12 Aug 2016)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2016/dsa-3648.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"wireshark on Debian Linux\");\n script_tag(name: \"insight\", value: \"Wireshark is a network 'sniffer' - a\ntool that captures and analyzes packets off the wire. Wireshark can decode too\nmany protocols to list here.\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie),\nthese problems have been fixed in version 1.12.1+g01b65bf-4+deb8u8.\n\nFor the testing distribution (stretch), these problems have been fixed\nin version 2.0.5+ga3be9c6-1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 2.0.5+ga3be9c6-1.\n\nWe recommend that you upgrade your wireshark packages.\");\n script_tag(name: \"summary\", value: \"Multiple vulnerabilities were discovered\nin the dissectors for NDS, PacketBB, WSP, MMSE, RLC, LDSS, RLC and OpenFlow, which\ncould result in denial of service or the execution of arbitrary code.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software\nversion using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"2.0.5+ga3be9c6-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"2.0.5+ga3be9c6-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark6:amd64\", ver:\"2.0.5+ga3be9c6-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark6:i386\", ver:\"2.0.5+ga3be9c6-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"2.0.5+ga3be9c6-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap5:amd64\", ver:\"2.0.5+ga3be9c6-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap5:i386\", ver:\"2.0.5+ga3be9c6-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif ((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"2.0.5+ga3be9c6-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil6:amd64\", ver:\"2.0.5+ga3be9c6-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil6:i386\", ver:\"2.0.5+ga3be9c6-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif ((res = isdpkgvuln(pkg:\"tshark\", ver:\"2.0.5+ga3be9c6-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark\", ver:\"2.0.5+ga3be9c6-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"2.0.5+ga3be9c6-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"2.0.5+ga3be9c6-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"2.0.5+ga3be9c6-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-gtk\", ver:\"2.0.5+ga3be9c6-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"2.0.5+ga3be9c6-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark5:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark5:i386\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif ((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif ((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif ((res = isdpkgvuln(pkg:\"tshark\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dbg\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"1.12.1+g01b65bf-4+deb8u8\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:35:49", "description": "Gentoo Linux Local Security Checks GLSA 201604-05", "cvss3": {}, "published": "2016-05-09T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201604-05", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-8713", "CVE-2015-8717", "CVE-2015-8741", "CVE-2015-8730", "CVE-2015-8714", "CVE-2015-8733", "CVE-2016-2531", "CVE-2015-8722", "CVE-2016-2527", "CVE-2016-2530", "CVE-2016-2524", "CVE-2015-8719", "CVE-2015-8715", "CVE-2015-8736", "CVE-2015-8726", "CVE-2016-2521", "CVE-2015-8731", "CVE-2015-8739", "CVE-2015-8724", "CVE-2015-8742", "CVE-2015-8738", "CVE-2016-2529", "CVE-2015-8723", "CVE-2015-8720", "CVE-2016-2528", "CVE-2016-2526", "CVE-2015-8725", "CVE-2015-8737", "CVE-2015-8735", "CVE-2015-8729", "CVE-2015-8721", "CVE-2015-8727", "CVE-2015-8728", "CVE-2016-2532", "CVE-2015-8712", "CVE-2016-2523", "CVE-2016-2525", "CVE-2016-2522", "CVE-2015-8732", "CVE-2015-8716", "CVE-2015-8734", "CVE-2015-8711", "CVE-2015-8740", "CVE-2015-8718"], "modified": "2018-10-26T00:00:00", "id": "OPENVAS:1361412562310121461", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310121461", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa-201604-05.nasl 12128 2018-10-26 13:35:25Z cfischer $\n#\n# Gentoo Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.fi>\n#\n# Copyright:\n# Copyright (c) 2016 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.121461\");\n script_version(\"$Revision: 12128 $\");\n script_tag(name:\"creation_date\", value:\"2016-05-09 14:21:27 +0300 (Mon, 09 May 2016)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 15:35:25 +0200 (Fri, 26 Oct 2018) $\");\n script_name(\"Gentoo Security Advisory GLSA 201604-05\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities have been discovered in Wireshark. Please review the CVE identifiers referenced below for details.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://security.gentoo.org/glsa/201604-05\");\n script_cve_id(\"CVE-2015-8711\", \"CVE-2015-8712\", \"CVE-2015-8713\", \"CVE-2015-8714\", \"CVE-2015-8715\", \"CVE-2015-8716\", \"CVE-2015-8717\", \"CVE-2015-8718\", \"CVE-2015-8719\", \"CVE-2015-8720\", \"CVE-2015-8721\", \"CVE-2015-8722\", \"CVE-2015-8723\", \"CVE-2015-8724\", \"CVE-2015-8725\", \"CVE-2015-8726\", \"CVE-2015-8727\", \"CVE-2015-8728\", \"CVE-2015-8729\", \"CVE-2015-8730\", \"CVE-2015-8731\", \"CVE-2015-8732\", \"CVE-2015-8733\", \"CVE-2015-8734\", \"CVE-2015-8735\", \"CVE-2015-8736\", \"CVE-2015-8737\", \"CVE-2015-8738\", \"CVE-2015-8739\", \"CVE-2015-8740\", \"CVE-2015-8741\", \"CVE-2015-8742\", \"CVE-2016-2521\", \"CVE-2016-2522\", \"CVE-2016-2523\", \"CVE-2016-2524\", \"CVE-2016-2525\", \"CVE-2016-2526\", \"CVE-2016-2527\", \"CVE-2016-2528\", \"CVE-2016-2529\", \"CVE-2016-2530\", \"CVE-2016-2531\", \"CVE-2016-2532\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Gentoo Linux Local Security Checks GLSA 201604-05\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Gentoo Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\n\nif((res=ispkgvuln(pkg:\"net-analyzer/wireshark\", unaffected: make_list(\"ge 2.0.2\"), vulnerable: make_list(\"lt 2.0.2\"))) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:32", "description": "This host is installed with Wireshark\n and is prone to multiple denial of service vulnerabilities.", "cvss3": {}, "published": "2016-08-09T00:00:00", "type": "openvas", "title": "Wireshark Multiple Denial of Service Vulnerabilities-02 August16 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-6505", "CVE-2016-6510", "CVE-2016-6511", "CVE-2016-6508", "CVE-2016-6506", "CVE-2016-6509"], "modified": "2018-10-29T00:00:00", "id": "OPENVAS:1361412562310808287", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310808287", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_wireshark_mult_dos_vuln02_aug16_win.nasl 12149 2018-10-29 10:48:30Z asteins $\n#\n# Wireshark Multiple Denial of Service Vulnerabilities-02 August16 (Windows)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:wireshark:wireshark\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.808287\");\n script_version(\"$Revision: 12149 $\");\n script_cve_id(\"CVE-2016-6511\", \"CVE-2016-6509\", \"CVE-2016-6510\", \"CVE-2016-6508\",\n \"CVE-2016-6506\", \"CVE-2016-6505\");\n script_bugtraq_id(92169, 92168, 92173, 92166, 92165, 92163);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-29 11:48:30 +0100 (Mon, 29 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2016-08-09 10:31:32 +0530 (Tue, 09 Aug 2016)\");\n script_name(\"Wireshark Multiple Denial of Service Vulnerabilities-02 August16 (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Wireshark\n and is prone to multiple denial of service vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws are due to,\n\n - An error in 'epan/proto.c' script cause OpenFlow dissector\n (and possibly others) to go into a long loop.\n\n - The 'epan/dissectors/packet-ldss.c' script in the LDSS dissector mishandles\n conversations.\n\n - An Off-by-one error in 'epan/dissectors/packet-rlc.c' script in the\n RLC dissector.\n\n - The 'epan/dissectors/packet-rlc.c' in the RLC dissector uses an\n incorrect integer data type.\n\n - An error in 'epan/dissectors/packet-wsp.c' script cause WSP dissector\n to go into a long loop.\n\n - An error in 'epan/dissectors/packet-packetbb.c' script could cause a\n divide-by-zero error in PacketBB dissector.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to conduct denial of service attack.\");\n\n script_tag(name:\"affected\", value:\"Wireshark version 1.12.x before 1.12.13 and\n 2.0.x before 2.0.5 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Wireshark version 1.12.13 or\n 2.0.5 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"http://openwall.com/lists/oss-security/2016/07/28/3\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-47.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-45.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-46.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-44.html\");\n\n script_category(ACT_GATHER_INFO);\n script_family(\"Denial of Service\");\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_dependencies(\"gb_wireshark_detect_win.nasl\");\n script_mandatory_keys(\"Wireshark/Win/Ver\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!wirversion = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(version:wirversion, test_version:\"1.12.0\", test_version2:\"1.12.12\"))\n{\n fix = \"1.12.13\";\n VULN = TRUE ;\n}\n\nelse if(version_in_range(version:wirversion, test_version:\"2.0\", test_version2:\"2.0.4\"))\n{\n fix = \"2.0.5\";\n VULN = TRUE ;\n}\n\nif(VULN)\n{\n report = report_fixed_ver(installed_version:wirversion, fixed_version:fix);\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:35:47", "description": "This host is installed with Wireshark\n and is prone to multiple denial of service vulnerabilities.", "cvss3": {}, "published": "2016-08-09T00:00:00", "type": "openvas", "title": "Wireshark Multiple Denial of Service Vulnerabilities-02 August16 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-6505", "CVE-2016-6510", "CVE-2016-6511", "CVE-2016-6508", "CVE-2016-6506", "CVE-2016-6509"], "modified": "2018-10-16T00:00:00", "id": "OPENVAS:1361412562310808288", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310808288", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_wireshark_mult_dos_vuln02_aug16_macosx.nasl 11922 2018-10-16 10:24:25Z asteins $\n#\n# Wireshark Multiple Denial of Service Vulnerabilities-02 August16 (Mac OS X)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:wireshark:wireshark\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.808288\");\n script_version(\"$Revision: 11922 $\");\n script_cve_id(\"CVE-2016-6511\", \"CVE-2016-6509\", \"CVE-2016-6510\", \"CVE-2016-6508\",\n \"CVE-2016-6506\", \"CVE-2016-6505\");\n script_bugtraq_id(92169, 92168, 92173, 92166, 92165, 92163);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-16 12:24:25 +0200 (Tue, 16 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2016-08-09 12:09:38 +0530 (Tue, 09 Aug 2016)\");\n script_name(\"Wireshark Multiple Denial of Service Vulnerabilities-02 August16 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Wireshark\n and is prone to multiple denial of service vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws are due to,\n\n - An error in 'epan/proto.c' script cause OpenFlow dissector\n (and possibly others) to go into a long loop.\n\n - The 'epan/dissectors/packet-ldss.c' script in the LDSS dissector mishandles\n conversations.\n\n - An Off-by-one error in 'epan/dissectors/packet-rlc.c' script in the\n RLC dissector.\n\n - The 'epan/dissectors/packet-rlc.c' in the RLC dissector uses an\n incorrect integer data type.\n\n - An error in 'epan/dissectors/packet-wsp.c' script cause WSP dissector\n to go into a long loop.\n\n - An error in 'epan/dissectors/packet-packetbb.c' script could cause a\n divide-by-zero error in PacketBB dissector.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to conduct denial of service attack.\");\n\n script_tag(name:\"affected\", value:\"Wireshark version 1.12.x before 1.12.13 and\n 2.0.x before 2.0.5 on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Wireshark version 1.12.13 or\n 2.0.5 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"http://openwall.com/lists/oss-security/2016/07/28/3\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-47.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-45.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-46.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-44.html\");\n\n script_category(ACT_GATHER_INFO);\n script_family(\"Denial of Service\");\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_dependencies(\"gb_wireshark_detect_macosx.nasl\");\n script_mandatory_keys(\"Wireshark/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!wirversion = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(version:wirversion, test_version:\"1.12.0\", test_version2:\"1.12.12\"))\n{\n fix = \"1.12.13\";\n VULN = TRUE ;\n}\n\nelse if(version_in_range(version:wirversion, test_version:\"2.0\", test_version2:\"2.0.4\"))\n{\n fix = \"2.0.5\";\n VULN = TRUE ;\n}\n\nif(VULN)\n{\n report = report_fixed_ver(installed_version:wirversion, fixed_version:fix);\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:35:37", "description": "Multiple vulnerabilities were discovered\nin the dissectors/parsers for PKTC, IAX2, GSM CBCH and NCP which could result in\ndenial of service.", "cvss3": {}, "published": "2016-05-22T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3585-1 (wireshark - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-4082", "CVE-2016-4081", "CVE-2016-4079", "CVE-2016-4085", "CVE-2016-4006", "CVE-2016-4080"], "modified": "2019-03-18T00:00:00", "id": "OPENVAS:1361412562310703585", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703585", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3585.nasl 14279 2019-03-18 14:48:34Z cfischer $\n# Auto-generated from advisory DSA 3585-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703585\");\n script_version(\"$Revision: 14279 $\");\n script_cve_id(\"CVE-2016-4006\", \"CVE-2016-4079\", \"CVE-2016-4080\", \"CVE-2016-4081\",\n \"CVE-2016-4082\", \"CVE-2016-4085\");\n script_name(\"Debian Security Advisory DSA 3585-1 (wireshark - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:48:34 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-05-22 00:00:00 +0200 (Sun, 22 May 2016)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2016/dsa-3585.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(8|9)\");\n script_tag(name:\"affected\", value:\"wireshark on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (jessie),\nthese problems have been fixed in version 1.12.1+g01b65bf-4+deb8u6.\n\nFor the testing distribution (stretch), these problems have been fixed\nin version 2.0.3+geed34f0-1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 2.0.3+geed34f0-1.\n\nWe recommend that you upgrade your wireshark packages.\");\n script_tag(name:\"summary\", value:\"Multiple vulnerabilities were discovered\nin the dissectors/parsers for PKTC, IAX2, GSM CBCH and NCP which could result in\ndenial of service.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software\nversion using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark5:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark5:i386\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif((res = isdpkgvuln(pkg:\"tshark\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dbg\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark6\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap5\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil6\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tshark\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-gtk\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"2.0.3+geed34f0-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2017-07-24T12:54:49", "description": "Multiple vulnerabilities were discovered\nin the dissectors/parsers for PKTC, IAX2, GSM CBCH and NCP which could result in\ndenial of service.", "cvss3": {}, "published": "2016-05-22T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3585-1 (wireshark - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-4082", "CVE-2016-4081", "CVE-2016-4079", "CVE-2016-4085", "CVE-2016-4006", "CVE-2016-4080"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:703585", "href": "http://plugins.openvas.org/nasl.php?oid=703585", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3585.nasl 6608 2017-07-07 12:05:05Z cfischer $\n# Auto-generated from advisory DSA 3585-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703585);\n script_version(\"$Revision: 6608 $\");\n script_cve_id(\"CVE-2016-4006\", \"CVE-2016-4079\", \"CVE-2016-4080\", \"CVE-2016-4081\",\n \"CVE-2016-4082\", \"CVE-2016-4085\");\n script_name(\"Debian Security Advisory DSA 3585-1 (wireshark - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:05 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2016-05-22 00:00:00 +0200 (Sun, 22 May 2016)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2016/dsa-3585.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"wireshark on Debian Linux\");\n script_tag(name: \"insight\", value: \"Wireshark is a network 'sniffer' -\na tool that captures and analyzes packets off the wire. Wireshark can decode\ntoo many protocols to list here.\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie),\nthese problems have been fixed in version 1.12.1+g01b65bf-4+deb8u6.\n\nFor the testing distribution (stretch), these problems have been fixed\nin version 2.0.3+geed34f0-1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 2.0.3+geed34f0-1.\n\nWe recommend that you upgrade your wireshark packages.\");\n script_tag(name: \"summary\", value: \"Multiple vulnerabilities were discovered\nin the dissectors/parsers for PKTC, IAX2, GSM CBCH and NCP which could result in\ndenial of service.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software\nversion using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark5:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark5:i386\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif ((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif ((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif ((res = isdpkgvuln(pkg:\"tshark\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dbg\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"1.12.1+g01b65bf-4+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark6\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap5\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil6\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tshark\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-gtk\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"2.0.3+geed34f0-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:34:57", "description": "This host is installed with Wireshark\n and is prone to multiple denial of service vulnerabilities.", "cvss3": {}, "published": "2016-01-11T00:00:00", "type": "openvas", "title": "Wireshark Multiple Denial-of-Service Vulnerabilities-02 January16 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-8730", "CVE-2015-8733", "CVE-2015-8722", "CVE-2015-8726", "CVE-2015-8731", "CVE-2015-8724", "CVE-2015-8723", "CVE-2015-8720", "CVE-2015-8725", "CVE-2015-8729", "CVE-2015-8721", "CVE-2015-8727", "CVE-2015-8728", "CVE-2015-8732", "CVE-2015-8711", "CVE-2015-8718"], "modified": "2018-10-18T00:00:00", "id": "OPENVAS:1361412562310806946", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806946", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_wireshark_mult_dos_vuln02_jan16_macosx.nasl 11969 2018-10-18 14:53:42Z asteins $\n#\n# Wireshark Multiple Denial-of-Service Vulnerabilities-02 January16 (Mac OS X)\n#\n# Authors:\n# Tushar Khelge <ktushar@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:wireshark:wireshark\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806946\");\n script_version(\"$Revision: 11969 $\");\n script_cve_id(\"CVE-2015-8733\", \"CVE-2015-8732\", \"CVE-2015-8731\", \"CVE-2015-8730\",\n \"CVE-2015-8729\", \"CVE-2015-8728\", \"CVE-2015-8727\", \"CVE-2015-8726\",\n \"CVE-2015-8725\", \"CVE-2015-8724\", \"CVE-2015-8723\", \"CVE-2015-8722\",\n \"CVE-2015-8721\", \"CVE-2015-8720\", \"CVE-2015-8718\", \"CVE-2015-8711\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-18 16:53:42 +0200 (Thu, 18 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2016-01-11 11:59:19 +0530 (Mon, 11 Jan 2016)\");\n script_name(\"Wireshark Multiple Denial-of-Service Vulnerabilities-02 January16 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Wireshark\n and is prone to multiple denial of service vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to\n multiple errors in Wireshark. For details refer the links mentioned in the\n reference links.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to conduct denial of service attack.\");\n\n script_tag(name:\"affected\", value:\"Wireshark version 1.12.x before 1.12.9\n and 2.0.x before 2.0.1 on Mac OS X\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Wireshark version 1.12.9 or\n 2.0.1 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"http://www.wireshark.org/security/wnpa-sec-2015-45.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2015-41.html\");\n script_xref(name:\"URL\", value:\"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11792\");\n script_xref(name:\"URL\", value:\"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11548\");\n\n script_category(ACT_GATHER_INFO);\n script_family(\"Denial of Service\");\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_dependencies(\"gb_wireshark_detect_macosx.nasl\");\n script_mandatory_keys(\"Wireshark/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!wirversion = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(wirversion, test_version:\"1.12.0\", test_version2:\"1.12.8\"))\n{\n fix = \"1.12.9\";\n VULN = TRUE ;\n}\n\nelse if(version_is_equal(version:wirversion, test_version:\"2.0.0\"))\n{\n fix = \"2.0.1\";\n VULN = TRUE ;\n}\n\nif(VULN)\n{\n report = 'Installed version: ' + wirversion + '\\n' +\n 'Fixed version: ' + fix + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:35:09", "description": "This host is installed with Wireshark\n and is prone to multiple denial of service vulnerabilities.", "cvss3": {}, "published": "2016-01-11T00:00:00", "type": "openvas", "title": "Wireshark Multiple Denial-of-Service Vulnerabilities-02 January16 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-8730", "CVE-2015-8733", "CVE-2015-8722", "CVE-2015-8726", "CVE-2015-8731", "CVE-2015-8724", "CVE-2015-8723", "CVE-2015-8720", "CVE-2015-8725", "CVE-2015-8729", "CVE-2015-8721", "CVE-2015-8727", "CVE-2015-8728", "CVE-2015-8732", "CVE-2015-8711", "CVE-2015-8718"], "modified": "2018-10-18T00:00:00", "id": "OPENVAS:1361412562310806945", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806945", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_wireshark_mult_dos_vuln02_jan16_win.nasl 11969 2018-10-18 14:53:42Z asteins $\n#\n# Wireshark Multiple Denial-of-Service Vulnerabilities-02 January16 (Windows)\n#\n# Authors:\n# Tushar Khelge <ktushar@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:wireshark:wireshark\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806945\");\n script_version(\"$Revision: 11969 $\");\n script_cve_id(\"CVE-2015-8733\", \"CVE-2015-8732\", \"CVE-2015-8731\", \"CVE-2015-8730\",\n \"CVE-2015-8729\", \"CVE-2015-8728\", \"CVE-2015-8727\", \"CVE-2015-8726\",\n \"CVE-2015-8725\", \"CVE-2015-8724\", \"CVE-2015-8723\", \"CVE-2015-8722\",\n \"CVE-2015-8721\", \"CVE-2015-8720\", \"CVE-2015-8718\", \"CVE-2015-8711\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-18 16:53:42 +0200 (Thu, 18 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2016-01-11 11:59:19 +0530 (Mon, 11 Jan 2016)\");\n script_name(\"Wireshark Multiple Denial-of-Service Vulnerabilities-02 January16 (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Wireshark\n and is prone to multiple denial of service vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to\n multiple errors in Wireshark. For details refer the links mentioned in the\n reference links.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to conduct denial of service attack.\");\n\n script_tag(name:\"affected\", value:\"Wireshark version 1.12.x before 1.12.9\n and 2.0.x before 2.0.1 on Windows\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Wireshark version 1.12.9 or\n 2.0.1 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"http://www.wireshark.org/security/wnpa-sec-2015-45.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2015-41.html\");\n script_xref(name:\"URL\", value:\"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11792\");\n script_xref(name:\"URL\", value:\"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11548\");\n\n script_category(ACT_GATHER_INFO);\n script_family(\"Denial of Service\");\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_dependencies(\"gb_wireshark_detect_win.nasl\");\n script_mandatory_keys(\"Wireshark/Win/Ver\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!wirversion = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(version:wirversion, test_version:\"1.12.0\", test_version2:\"1.12.8\"))\n{\n fix = \"1.12.9\";\n VULN = TRUE ;\n}\n\nelse if(version_is_equal(version:wirversion, test_version:\"2.0.0\"))\n{\n fix = \"2.0.1\";\n VULN = TRUE ;\n}\n\nif(VULN)\n{\n report = 'Installed version: ' + wirversion + '\\n' +\n 'Fixed version: ' + fix + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:35:39", "description": "This host is installed with Wireshark\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2016-03-03T00:00:00", "type": "openvas", "title": "Wireshark Multiple Vulnerabilities March16 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-2531", "CVE-2016-4421", "CVE-2016-4418", "CVE-2016-2521", "CVE-2016-4417", "CVE-2016-2532", "CVE-2016-2523"], "modified": "2018-10-18T00:00:00", "id": "OPENVAS:1361412562310807448", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310807448", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_wireshark_mult_vuln_march16_win.nasl 11969 2018-10-18 14:53:42Z asteins $\n#\n# Wireshark Multiple Vulnerabilities March16 (Windows)\n#\n# Authors:\n# Tushar Khelge <ktushar@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:wireshark:wireshark\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.807448\");\n script_version(\"$Revision: 11969 $\");\n script_cve_id(\"CVE-2016-2532\", \"CVE-2016-2531\", \"CVE-2016-2523\", \"CVE-2016-2521\",\n \"CVE-2016-4421\", \"CVE-2016-4418\", \"CVE-2016-4417\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-18 16:53:42 +0200 (Thu, 18 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2016-03-03 10:39:01 +0530 (Thu, 03 Mar 2016)\");\n script_name(\"Wireshark Multiple Vulnerabilities March16 (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Wireshark\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - The 'dissect_llrp_parameters' function in 'epan/dissectors/packet-llrp.c' script\n in the LLRP dissector does not limit the recursion depth.\n\n - The Off-by-one error in 'epan/dissectors/packet-rsl.c' script in the RSL\n dissector.\n\n - The 'dnp3_al_process_object' function in 'epan/dissectors/packet-dnp.c' script\n in the DNP3 dissector\n\n - An untrusted search path vulnerability in the Application class\n 'ui/qt/wireshark_application.cpp' script.\n\n - Multiple errors in 'epan/dissectors/packet-ber.c' script in the ASN.1 BER dissector.\n\n - An Off-by-one error in 'epan/dissectors/packet-gsm_abis_oml.c' script in the\n GSM A-bis OML dissector.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to conduct denial of service attack and local users to gain privileges.\");\n\n script_tag(name:\"affected\", value:\"Wireshark version 1.12.x before 1.12.10\n and 2.0.x before 2.0.2 on Windows\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Wireshark version 1.12.10 or\n 2.0.2 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"http://www.wireshark.org/security/wnpa-sec-2016-01.html\");\n script_xref(name:\"URL\", value:\"http://www.wireshark.org/security/wnpa-sec-2016-03.html\");\n script_xref(name:\"URL\", value:\"http://www.wireshark.org/security/wnpa-sec-2016-10.html\");\n script_xref(name:\"URL\", value:\"http://www.wireshark.org/security/wnpa-sec-2016-11.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-18.html\");\n\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_dependencies(\"gb_wireshark_detect_win.nasl\");\n script_mandatory_keys(\"Wireshark/Win/Ver\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!wirversion = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(version:wirversion, test_version:\"1.12.0\", test_version2:\"1.12.9\"))\n{\n fix = \"1.12.10\";\n VULN = TRUE ;\n}\n\nelse if(version_in_range(version:wirversion, test_version:\"2.0.0\", test_version2:\"2.0.1\"))\n{\n fix = \"2.0.2\";\n VULN = TRUE ;\n}\n\nif(VULN)\n{\n report = report_fixed_ver(installed_version:wirversion, fixed_version:fix);\n security_message(data:report);\n exit(0);\n}", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:26:23", "description": "This host is installed with Wireshark\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2016-03-03T00:00:00", "type": "openvas", "title": "Wireshark Multiple Vulnerabilities March16 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-2531", "CVE-2016-4421", "CVE-2016-4418", "CVE-2016-2521", "CVE-2016-4417", "CVE-2016-2532", "CVE-2016-2523"], "modified": "2019-07-05T00:00:00", "id": "OPENVAS:1361412562310807449", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310807449", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Wireshark Multiple Vulnerabilities March16 (Mac OS X)\n#\n# Authors:\n# Tushar Khelge <ktushar@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:wireshark:wireshark\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.807449\");\n script_version(\"2019-07-05T09:12:25+0000\");\n script_cve_id(\"CVE-2016-2532\", \"CVE-2016-2531\", \"CVE-2016-2523\", \"CVE-2016-2521\",\n \"CVE-2016-4421\", \"CVE-2016-4418\", \"CVE-2016-4417\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 09:12:25 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2016-03-03 13:23:19 +0530 (Thu, 03 Mar 2016)\");\n script_name(\"Wireshark Multiple Vulnerabilities March16 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Wireshark\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - The 'dissect_llrp_parameters' function in 'epan/dissectors/packet-llrp.c'\n script in the LLRP dissector does not limit the recursion depth.\n\n - The Off-by-one error in 'epan/dissectors/packet-rsl.c' script in the RSL\n dissector.\n\n - The 'dnp3_al_process_object' function in 'epan/dissectors/packet-dnp.c' script\n in the DNP3 dissector\n\n - An untrusted search path vulnerability in the Application class\n 'ui/qt/wireshark_application.cpp' script.\n\n - Multiple errors in 'epan/dissectors/packet-ber.c' script in the ASN.1 BER dissector.\n\n - An Off-by-one error in 'epan/dissectors/packet-gsm_abis_oml.c' script in the\n GSM A-bis OML dissector.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to conduct denial of service attack and local users to gain privileges.\");\n\n script_tag(name:\"affected\", value:\"Wireshark version 1.12.x before 1.12.10\n and 2.0.x before 2.0.2 on Mac OS X\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Wireshark version 1.12.10 or\n 2.0.2 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"http://www.wireshark.org/security/wnpa-sec-2016-01.html\");\n script_xref(name:\"URL\", value:\"http://www.wireshark.org/security/wnpa-sec-2016-03.html\");\n script_xref(name:\"URL\", value:\"http://www.wireshark.org/security/wnpa-sec-2016-10.html\");\n script_xref(name:\"URL\", value:\"http://www.wireshark.org/security/wnpa-sec-2016-11.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2016-18.html\");\n\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_dependencies(\"gb_wireshark_detect_macosx.nasl\");\n script_mandatory_keys(\"Wireshark/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!wirversion = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(version:wirversion, test_version:\"1.12.0\", test_version2:\"1.12.9\"))\n{\n fix = \"1.12.10\";\n VULN = TRUE ;\n}\n\nelse if(version_in_range(version:wirversion, test_version:\"2.0.0\", test_version2:\"2.0.1\"))\n{\n fix = \"2.0.2\";\n VULN = TRUE ;\n}\n\nif(VULN)\n{\n report = report_fixed_ver(installed_version:wirversion, fixed_version:fix);\n security_message(data:report);\n exit(0);\n}", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:32", "description": "Mageia Linux Local Security Checks mgasa-2016-0091", "cvss3": {}, "published": "2016-03-03T00:00:00", "type": "openvas", "title": "Mageia Linux Local Check: mgasa-2016-0091", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-2531", "CVE-2016-2527", "CVE-2016-2530", "CVE-2016-2524", "CVE-2016-2529", "CVE-2016-2528", "CVE-2016-2526", "CVE-2016-2532", "CVE-2016-2523", "CVE-2016-2525", "CVE-2016-2522"], "modified": "2019-03-14T00:00:00", "id": "OPENVAS:1361412562310131246", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310131246", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: mgasa-2016-0091.nasl 14180 2019-03-14 12:29:16Z cfischer $\n#\n# Mageia Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2016 Eero Volotinen, http://www.solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.131246\");\n script_version(\"$Revision: 14180 $\");\n script_tag(name:\"creation_date\", value:\"2016-03-03 14:39:16 +0200 (Thu, 03 Mar 2016)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-14 13:29:16 +0100 (Thu, 14 Mar 2019) $\");\n script_name(\"Mageia Linux Local Check: mgasa-2016-0091\");\n script_tag(name:\"insight\", value:\"Updated wireshark packages fix security vulnerabilities: ASN.1 BER dissector crash (CVE-2016-2522). DNP dissector infinite loop (CVE-2016-2523). X.509AF dissector crash (CVE-2016-2524). HTTP/2 dissector crash (CVE-2016-2525). HiQnet dissector crash (CVE-2016-2526). 3GPP TS 32.423 Trace file parser crash (CVE-2016-2527). LBMC dissector crash (CVE-2016-2528). iSeries file parser crash (CVE-2016-2529). RSL dissector crash (CVE-2016-2530, CVE-2016-2531). LLRP dissector crash (CVE-2016-2532). The wireshark package has been updated to version 2.0.2, fixing these issues as well as other dissector crashes, a dissector loop issue, another file parser crash, and several other bugs. See the upstream release notes for details.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://advisories.mageia.org/MGASA-2016-0091.html\");\n script_cve_id(\"CVE-2016-2522\", \"CVE-2016-2523\", \"CVE-2016-2524\", \"CVE-2016-2525\", \"CVE-2016-2526\", \"CVE-2016-2527\", \"CVE-2016-2528\", \"CVE-2016-2529\", \"CVE-2016-2530\", \"CVE-2016-2531\", \"CVE-2016-2532\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mageia_linux\", \"ssh/login/release\", re:\"ssh/login/release=MAGEIA5\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Mageia Linux Local Security Checks mgasa-2016-0091\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Mageia Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"MAGEIA5\")\n{\nif ((res = isrpmvuln(pkg:\"wireshark\", rpm:\"wireshark~2.0.2~1.mga5\", rls:\"MAGEIA5\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:34:18", "description": "This host is installed with Wireshark\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2017-06-02T00:00:00", "type": "openvas", "title": "Wireshark Multiple Denial-of-Service Vulnerabilities-01 June17 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-9354", "CVE-2017-9344", "CVE-2017-9349", "CVE-2017-9343", "CVE-2017-9346", "CVE-2017-9345", "CVE-2017-9351", "CVE-2017-9352", "CVE-2017-9350"], "modified": "2018-10-12T00:00:00", "id": "OPENVAS:1361412562310811070", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310811070", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_wireshark_mult_dos_vuln01_june_win.nasl 11863 2018-10-12 09:42:02Z mmartin $\n#\n# Wireshark Multiple Denial-of-Service Vulnerabilities-01 June17 (Windows)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:wireshark:wireshark\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.811070\");\n script_version(\"$Revision: 11863 $\");\n script_cve_id(\"CVE-2017-9352\", \"CVE-2017-9351\", \"CVE-2017-9346\", \"CVE-2017-9345\",\n \"CVE-2017-9349\", \"CVE-2017-9350\", \"CVE-2017-9344\", \"CVE-2017-9343\",\n \"CVE-2017-9354\");\n script_bugtraq_id(98804, 98808, 98799, 98798, 98803, 98806, 98796, 98797, 98802);\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 11:42:02 +0200 (Fri, 12 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2017-06-02 15:48:52 +0530 (Fri, 02 Jun 2017)\");\n script_name(\"Wireshark Multiple Denial-of-Service Vulnerabilities-01 June17 (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Wireshark\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - An error in the epan/dissectors/packet-rgmp.c script within the RGMP\n dissector which could crash.\n\n - An error in the epan/dissectors/packet-msnip.c script within the MSNIP\n dissector which misuses a NULL pointer.\n\n - An error in the epan/dissectors/packet-btl2cap.c script within the Bluetooth\n L2CAP dissector which could divide by zero.\n\n - An error in the epan/dissectors/packet-opensafety.c script within the openSAFETY\n dissector which could crash or exhaust system memory.\n\n - An error in the epan/dissectors/packet-dcm.c script within the DICOM dissector\n which could go into an infinite loop.\n\n - An error in the epan/dissectors/packet-slsk.c script within the SoulSeek\n dissector which could go into an infinite loop.\n\n - An error in the epan/dissectors/packet-dns.c script within the DNS dissector\n which could go into an infinite loop.\n\n - An error in epan/dissectors/packet-bzr.c script within the Bazaar dissector\n which could go into an infinite loop.\n\n - An error in epan/dissectors/packet-bootp.c script within the DHCP dissector\n which could read past the end of a buffer.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attacker\n to crash wireshark or consume excessive CPU resources.\");\n\n script_tag(name:\"affected\", value:\"Wireshark version 2.2.0 through 2.2.6\n and 2.0.0 through 2.0.12 on Windows\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Wireshark version 2.2.7 or\n 2.0.13 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-32.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-30.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-29.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-28.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-27.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-25.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-26.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-22.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-24.html\");\n\n script_category(ACT_GATHER_INFO);\n script_family(\"Denial of Service\");\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_dependencies(\"gb_wireshark_detect_win.nasl\");\n script_mandatory_keys(\"Wireshark/Win/Ver\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!wirversion = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(wirversion =~ \"^(2\\.2)\" && version_is_less(version:wirversion, test_version:\"2.2.7\")){\n fix = \"2.2.7\";\n}\nelse if(wirversion =~ \"^(2\\.0)\" && version_is_less(version:wirversion, test_version:\"2.0.13\")){\n fix = \"2.0.13\";\n}\n\nif(fix)\n{\n report = report_fixed_ver(installed_version:wirversion, fixed_version:fix);\n security_message(data:report);\n exit(0);\n}", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:33:57", "description": "This host is installed with Wireshark\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2017-06-02T00:00:00", "type": "openvas", "title": "Wireshark Multiple Denial-of-Service Vulnerabilities-01 June17 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-9354", "CVE-2017-9344", "CVE-2017-9349", "CVE-2017-9343", "CVE-2017-9346", "CVE-2017-9345", "CVE-2017-9351", "CVE-2017-9352", "CVE-2017-9350"], "modified": "2018-10-18T00:00:00", "id": "OPENVAS:1361412562310811071", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310811071", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_wireshark_mult_dos_vuln01_june_macosx.nasl 11959 2018-10-18 10:33:40Z mmartin $\n#\n# Wireshark Multiple Denial-of-Service Vulnerabilities-01 June17 (Mac OS X)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:wireshark:wireshark\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.811071\");\n script_version(\"$Revision: 11959 $\");\n script_cve_id(\"CVE-2017-9352\", \"CVE-2017-9351\", \"CVE-2017-9346\", \"CVE-2017-9345\",\n \"CVE-2017-9349\", \"CVE-2017-9350\", \"CVE-2017-9344\", \"CVE-2017-9343\",\n \"CVE-2017-9354\");\n script_bugtraq_id(98804, 98808, 98799, 98798, 98803, 98806, 98796, 98797, 98802);\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-18 12:33:40 +0200 (Thu, 18 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2017-06-02 16:51:51 +0530 (Fri, 02 Jun 2017)\");\n script_name(\"Wireshark Multiple Denial-of-Service Vulnerabilities-01 June17 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Wireshark\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - An error in the epan/dissectors/packet-rgmp.c script within the RGMP\n dissector which could crash.\n\n - An error in the epan/dissectors/packet-msnip.c script within the MSNIP\n dissector which misuses a NULL pointer.\n\n - An error in the epan/dissectors/packet-btl2cap.c script within the Bluetooth\n L2CAP dissector which could divide by zero.\n\n - An error in the epan/dissectors/packet-opensafety.c script within the openSAFETY\n dissector which could crash or exhaust system memory.\n\n - An error in the epan/dissectors/packet-dcm.c script within the DICOM dissector\n which could go into an infinite loop.\n\n - An error in the epan/dissectors/packet-slsk.c script within the SoulSeek\n dissector which could go into an infinite loop.\n\n - An error in the epan/dissectors/packet-dns.c script within the DNS dissector\n which could go into an infinite loop.\n\n - An error in epan/dissectors/packet-bzr.c script within the Bazaar dissector\n which could go into an infinite loop.\n\n - An error in epan/dissectors/packet-bootp.c script within the DHCP dissector\n which could read past the end of a buffer.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attacker\n to crash wireshark or consume excessive CPU resources.\");\n\n script_tag(name:\"affected\", value:\"Wireshark version 2.2.0 through 2.2.6\n and 2.0.0 through 2.0.12 on Mac OS X\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Wireshark version 2.2.7 or\n 2.0.13 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-32.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-30.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-29.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-28.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-27.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-25.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-26.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-22.html\");\n script_xref(name:\"URL\", value:\"https://www.wireshark.org/security/wnpa-sec-2017-24.html\");\n\n script_category(ACT_GATHER_INFO);\n script_family(\"Denial of Service\");\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_dependencies(\"gb_wireshark_detect_macosx.nasl\");\n script_mandatory_keys(\"Wireshark/MacOSX/Version\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!wirversion = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(wirversion =~ \"^(2\\.2)\" && version_is_less(version:wirversion, test_version:\"2.2.7\")){\n fix = \"2.2.7\";\n}\nelse if(wirversion =~ \"^(2\\.0)\" && version_is_less(version:wirversion, test_version:\"2.0.13\")){\n fix = \"2.0.13\";\n}\n\nif(fix)\n{\n report = report_fixed_ver(installed_version:wirversion, fixed_version:fix);\n security_message(data:report);\n exit(0);\n}", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2017-07-24T12:54:44", "description": "Multiple vulnerabilities were\ndiscovered in the dissectors/parsers for PKTC, IAX2, GSM CBCH and NCP, SPOOLS,\nIEEE 802.11, UMTS FP, USB, Toshiba, CoSine, NetScreen, WBXML which could result\nin denial of service or potentially the execution of arbitrary code.", "cvss3": {}, "published": "2016-07-02T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3615-1 (wireshark - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-5350", "CVE-2016-5356", "CVE-2016-5355", "CVE-2016-5354", "CVE-2016-5357", "CVE-2016-5353", "CVE-2016-5359", "CVE-2016-5351"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:703615", "href": "http://plugins.openvas.org/nasl.php?oid=703615", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3615.nasl 6608 2017-07-07 12:05:05Z cfischer $\n# Auto-generated from advisory DSA 3615-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703615);\n script_version(\"$Revision: 6608 $\");\n script_cve_id(\"CVE-2016-5350\", \"CVE-2016-5351\", \"CVE-2016-5353\", \"CVE-2016-5354\",\n \"CVE-2016-5355\", \"CVE-2016-5356\", \"CVE-2016-5357\", \"CVE-2016-5359\");\n script_name(\"Debian Security Advisory DSA 3615-1 (wireshark - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:05 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2016-07-02 00:00:00 +0200 (Sat, 02 Jul 2016)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2016/dsa-3615.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"wireshark on Debian Linux\");\n script_tag(name: \"insight\", value: \"Wireshark is a network 'sniffer' -\na tool that captures and analyzes packets off the wire. Wireshark can decode too\nmany protocols to list here.\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie),\nthese problems have been fixed in version 1.12.1+g01b65bf-4+deb8u7.\n\nFor the testing distribution (stretch), these problems have been fixed\nin version 2.0.4+gdd7746e-1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 2.0.4+gdd7746e-1.\n\nWe recommend that you upgrade your wireshark packages.\");\n script_tag(name: \"summary\", value: \"Multiple vulnerabilities were\ndiscovered in the dissectors/parsers for PKTC, IAX2, GSM CBCH and NCP, SPOOLS,\nIEEE 802.11, UMTS FP, USB, Toshiba, CoSine, NetScreen, WBXML which could result\nin denial of service or potentially the execution of arbitrary code.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software\nversion using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark5:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark5:i386\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tshark\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dbg\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"2.0.4+gdd7746e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"2.0.4+gdd7746e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark6:amd64\", ver:\"2.0.4+gdd7746e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark6:i386\", ver:\"2.0.4+gdd7746e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"2.0.4+gdd7746e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap5:amd64\", ver:\"2.0.4+gdd7746e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap5:i386\", ver:\"2.0.4+gdd7746e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"2.0.4+gdd7746e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil6:amd64\", ver:\"2.0.4+gdd7746e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil6:i386\", ver:\"2.0.4+gdd7746e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tshark\", ver:\"2.0.4+gdd7746e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark\", ver:\"2.0.4+gdd7746e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"2.0.4+gdd7746e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"2.0.4+gdd7746e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"2.0.4+gdd7746e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-gtk\", ver:\"2.0.4+gdd7746e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"2.0.4+gdd7746e-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:35:36", "description": "Multiple vulnerabilities were\ndiscovered in the dissectors/parsers for PKTC, IAX2, GSM CBCH and NCP, SPOOLS,\nIEEE 802.11, UMTS FP, USB, Toshiba, CoSine, NetScreen, WBXML which could result\nin denial of service or potentially the execution of arbitrary code.", "cvss3": {}, "published": "2016-07-02T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3615-1 (wireshark - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-5350", "CVE-2016-5356", "CVE-2016-5355", "CVE-2016-5354", "CVE-2016-5357", "CVE-2016-5353", "CVE-2016-5359", "CVE-2016-5351"], "modified": "2019-03-18T00:00:00", "id": "OPENVAS:1361412562310703615", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703615", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3615.nasl 14279 2019-03-18 14:48:34Z cfischer $\n# Auto-generated from advisory DSA 3615-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703615\");\n script_version(\"$Revision: 14279 $\");\n script_cve_id(\"CVE-2016-5350\", \"CVE-2016-5351\", \"CVE-2016-5353\", \"CVE-2016-5354\",\n \"CVE-2016-5355\", \"CVE-2016-5356\", \"CVE-2016-5357\", \"CVE-2016-5359\");\n script_name(\"Debian Security Advisory DSA 3615-1 (wireshark - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:48:34 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-07-02 00:00:00 +0200 (Sat, 02 Jul 2016)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2016/dsa-3615.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(8|9)\");\n script_tag(name:\"affected\", value:\"wireshark on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (jessie),\nthese problems have been fixed in version 1.12.1+g01b65bf-4+deb8u7.\n\nFor the testing distribution (stretch), these problems have been fixed\nin version 2.0.4+gdd7746e-1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 2.0.4+gdd7746e-1.\n\nWe recommend that you upgrade your wireshark packages.\");\n script_tag(name:\"summary\", value:\"Multiple vulnerabilities were\ndiscovered in the dissectors/parsers for PKTC, IAX2, GSM CBCH and NCP, SPOOLS,\nIEEE 802.11, UMTS FP, USB, Toshiba, CoSine, NetScreen, WBXML which could result\nin denial of service or potentially the execution of arbitrary code.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software\nversion using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark5:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark5:i386\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tshark\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dbg\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"1.12.1+g01b65bf-4+deb8u7\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"2.0.4+gdd7746e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"2.0.4+gdd7746e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark6:amd64\", ver:\"2.0.4+gdd7746e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwireshark6:i386\", ver:\"2.0.4+gdd7746e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"2.0.4+gdd7746e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap5:amd64\", ver:\"2.0.4+gdd7746e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwiretap5:i386\", ver:\"2.0.4+gdd7746e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"2.0.4+gdd7746e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil6:amd64\", ver:\"2.0.4+gdd7746e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libwsutil6:i386\", ver:\"2.0.4+gdd7746e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tshark\", ver:\"2.0.4+gdd7746e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark\", ver:\"2.0.4+gdd7746e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"2.0.4+gdd7746e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"2.0.4+gdd7746e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"2.0.4+gdd7746e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-gtk\", ver:\"2.0.4+gdd7746e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"2.0.4+gdd7746e-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2017-07-24T12:55:17", "description": "Multiple vulnerabilities were\ndiscovered in the dissectors for H.225, Catapult DCT2000, UMTS FP and IPMI,\nwhich could result in denial of service or the execution of arbitrary code.", "cvss3": {}, "published": "2016-09-20T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3671-1 (wireshark - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-7176", "CVE-2016-7177", "CVE-2016-7180", "CVE-2016-7179", "CVE-2016-7178"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:703671", "href": "http://plugins.openvas.org/nasl.php?oid=703671", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3671.nasl 6608 2017-07-07 12:05:05Z cfischer $\n# Auto-generated from advisory DSA 3671-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703671);\n script_version(\"$Revision: 6608 $\");\n script_cve_id(\"CVE-2016-7176\", \"CVE-2016-7177\", \"CVE-2016-7178\", \"CVE-2016-7179\",\n \"CVE-2016-7180\");\n script_name(\"Debian Security Advisory DSA 3671-1 (wireshark - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:05 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2016-09-20 00:00:00 +0200 (Tue, 20 Sep 2016)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2016/dsa-3671.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"wireshark on Debian Linux\");\n script_tag(name: \"insight\", value: \"Wireshark is a network 'sniffer' - a\ntool that captures and analyzes packets off the wire. Wireshark can decode too\nmany protocols to list here.\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie),\nthese problems have been fixed in version 1.12.1+g01b65bf-4+deb8u9.\n\nFor the testing distribution (stretch), these problems have been fixed\nin version 2.2.0+g5368c50-1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 2.2.0+g5368c50-1.\n\nWe recommend that you upgrade your wireshark packages.\");\n script_tag(name: \"summary\", value: \"Multiple vulnerabilities were\ndiscovered in the dissectors for H.225, Catapult DCT2000, UMTS FP and IPMI,\nwhich could result in denial of service or the execution of arbitrary code.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed\nsoftware version using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"1.12.1+g01b65bf-4+deb8u9\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u9\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark5:i386\", ver:\"1.12.1+g01b65bf-4+deb8u9\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark5:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u9\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"1.12.1+g01b65bf-4+deb8u9\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u9\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u9\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil-dev\", ver:\"1.12.1+g01b65bf-4+deb8u9\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil4:amd64\", ver:\"1.12.1+g01b65bf-4+deb8u9\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwsutil4:i386\", ver:\"1.12.1+g01b65bf-4+deb8u9\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tshark\", ver:\"1.12.1+g01b65bf-4+deb8u9\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark\", ver:\"1.12.1+g01b65bf-4+deb8u9\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-common\", ver:\"1.12.1+g01b65bf-4+deb8u9\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dbg\", ver:\"1.12.1+g01b65bf-4+deb8u9\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-dev\", ver:\"1.12.1+g01b65bf-4+deb8u9\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-doc\", ver:\"1.12.1+g01b65bf-4+deb8u9\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wireshark-qt\", ver:\"1.12.1+g01b65bf-4+deb8u9\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-data\", ver:\"2.2.0+g5368c50-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark-dev\", ver:\"2.2.0+g5368c50-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark8:amd64\", ver:\"2.2.0+g5368c50-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwireshark8:i386\", ver:\"2.2.0+g5368c50-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwiretap-dev\", ver:\"2.2.0+g5368c50-1\", rls_regex:\&quo