CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
EPSS
Percentile
99.0%
Wed Jan 5 2011 Jan Safranek <jsafrane at redhat.com> - 1.2.13-2
fixed buffer overflow in ENTTEC dissector (#666897)
Mon Nov 22 2010 Jan Safranek <jsafrane at redhat.com>
upgrade to 1.2.13
see http://www.wireshark.org/docs/relnotes/wireshark-1.2.1 3.html
Mon Sep 13 2010 Jan Safranek <jsafrane at redhat.com>
upgrade to 1.2.11
see http://www.wireshark.org/docs/relnotes/wireshark-1.2.1 1.html
Resolves: #632539
Tue Aug 24 2010 Jan Safranek <jsafrane at redhat.com>
upgrade to 1.2.10
see http://www.wireshark.org/docs/relnotes/wireshark-1.2.1 0.html
Resolves: #625940 CVE-2010-2287 CVE-2010-2286 CVE-2010-2284 CVE-2010-2283
Mon May 17 2010 Radek Vokal <rvokal at redhat.com> - 1.2.8-3
removing traling bracket from python_sitearch (#592391)
Fri May 7 2010 Radek Vokal <rvokal at redhat.com> - 1.2.8-2
add libtool patch
Fri May 7 2010 Radek Vokal <rvokal at redhat.com> - 1.2.8-1
use sitearch instead of sitelib to avoid pyo and pyc conflicts
upgrade to 1.2.8
see http://www.wireshark.org/docs/relnotes/wireshark-1.2.8 .html
rebuild with GeoIP support (needs to be turned on in IP protocol preferences)
bring back -pie
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2011-0167.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(51519);
script_version("1.13");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2010-4538");
script_xref(name:"FEDORA", value:"2011-0167");
script_name(english:"Fedora 13 : wireshark-1.2.13-2.fc13 (2011-0167)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
" - Wed Jan 5 2011 Jan Safranek <jsafrane at redhat.com> -
1.2.13-2
- fixed buffer overflow in ENTTEC dissector (#666897)
- Mon Nov 22 2010 Jan Safranek <jsafrane at redhat.com>
- 1.2.13-1
- upgrade to 1.2.13
- see
http://www.wireshark.org/docs/relnotes/wireshark-1.2.1
3.html
- Mon Sep 13 2010 Jan Safranek <jsafrane at redhat.com>
- 1.2.11-1
- upgrade to 1.2.11
- see
http://www.wireshark.org/docs/relnotes/wireshark-1.2.1
1.html
- Resolves: #632539
- Tue Aug 24 2010 Jan Safranek <jsafrane at redhat.com>
- 1.2.10-1
- upgrade to 1.2.10
- see
http://www.wireshark.org/docs/relnotes/wireshark-1.2.1
0.html
- Resolves: #625940 CVE-2010-2287 CVE-2010-2286
CVE-2010-2284 CVE-2010-2283
- Mon May 17 2010 Radek Vokal <rvokal at redhat.com> -
1.2.8-3
- removing traling bracket from python_sitearch
(#592391)
- Fri May 7 2010 Radek Vokal <rvokal at redhat.com> -
1.2.8-2
- add libtool patch
- Fri May 7 2010 Radek Vokal <rvokal at redhat.com> -
1.2.8-1
- use sitearch instead of sitelib to avoid pyo and pyc
conflicts
- upgrade to 1.2.8
- see
http://www.wireshark.org/docs/relnotes/wireshark-1.2.8
.html
- rebuild with GeoIP support (needs to be turned on in
IP protocol preferences)
- bring back -pie
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
# http://www.wireshark.org/docs/relnotes/wireshark-1.2.10.html
script_set_attribute(
attribute:"see_also",
value:"https://www.wireshark.org/docs/relnotes/wireshark-1.2.10.html"
);
# http://www.wireshark.org/docs/relnotes/wireshark-1.2.11.html
script_set_attribute(
attribute:"see_also",
value:"https://www.wireshark.org/docs/relnotes/wireshark-1.2.11.html"
);
# http://www.wireshark.org/docs/relnotes/wireshark-1.2.13.html
script_set_attribute(
attribute:"see_also",
value:"https://www.wireshark.org/docs/relnotes/wireshark-1.2.13.html"
);
# http://www.wireshark.org/docs/relnotes/wireshark-1.2.8.html
script_set_attribute(
attribute:"see_also",
value:"https://www.wireshark.org/docs/relnotes/wireshark-1.2.8.html"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=666894"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2011-January/053061.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?b7bb23f3"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected wireshark package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
script_set_attribute(attribute:"canvas_package", value:'White_Phosphorus');
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:wireshark");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:13");
script_set_attribute(attribute:"patch_publication_date", value:"2011/01/05");
script_set_attribute(attribute:"plugin_publication_date", value:"2011/01/14");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^13([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 13.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC13", reference:"wireshark-1.2.13-2.fc13")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "wireshark");
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4538
www.nessus.org/u?b7bb23f3
bugzilla.redhat.com/show_bug.cgi?id=666894
www.wireshark.org/docs/relnotes/wireshark-1.2.10.html
www.wireshark.org/docs/relnotes/wireshark-1.2.11.html
www.wireshark.org/docs/relnotes/wireshark-1.2.13.html
www.wireshark.org/docs/relnotes/wireshark-1.2.8.html