CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
EPSS
Percentile
94.8%
dumpcap now stores temporary capture files in /var/tmp
Convert automake/pkgconfig files into patches (better upstream integration)
Restored category in the *.desktop file
Install another one necessary header file - frame_data_sequence.h
Add basic OpenFlow dissector
Ver. 1.10.1 fix missing ws_symbol_export.h
Ver. 1.10.2
Ver. 1.10.1 fix missing ws_symbol_export.h
Enhance desktop integration (*.desktop and MIME-related files)
Add basic OpenFlow dissector
Ver. 1.10.2
Ver. 1.10.1 fix missing ws_symbol_export.h
Ver. 1.10.2
Ver. 1.10.1 fix missing ws_symbol_export.h
Enhance desktop integration (*.desktop and MIME-related files)
Add basic OpenFlow dissector
Ver. 1.10.2
Ver. 1.10.1 fix missing ws_symbol_export.h
Ver. 1.10.2
Ver. 1.10.1 fix missing ws_symbol_export.h
Ver. 1.10.2
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2013-17627.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(70280);
script_version("1.9");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2013-3555", "CVE-2013-3557", "CVE-2013-3558", "CVE-2013-3559", "CVE-2013-3560", "CVE-2013-3562", "CVE-2013-4074", "CVE-2013-4075", "CVE-2013-4076", "CVE-2013-4077", "CVE-2013-4078", "CVE-2013-4079", "CVE-2013-4080", "CVE-2013-4081", "CVE-2013-4082", "CVE-2013-4083", "CVE-2013-4920", "CVE-2013-4921", "CVE-2013-4922", "CVE-2013-4923", "CVE-2013-4924", "CVE-2013-4925", "CVE-2013-4926", "CVE-2013-4927", "CVE-2013-4928", "CVE-2013-4929", "CVE-2013-4930", "CVE-2013-4931", "CVE-2013-4932", "CVE-2013-4933", "CVE-2013-4934", "CVE-2013-4935");
script_bugtraq_id(59992, 59994, 59995, 59998, 59999, 60021, 60495, 60498, 60499, 60500, 60501, 60502, 60503, 60504, 60505, 60506, 61471);
script_xref(name:"FEDORA", value:"2013-17627");
script_name(english:"Fedora 20 : wireshark-1.10.2-7.fc20 (2013-17627)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"dumpcap now stores temporary capture files in /var/tmp
- Convert automake/pkgconfig files into patches (better
upstream integration)
- Restored category in the *.desktop file
- Install another one necessary header file -
frame_data_sequence.h
- Add basic OpenFlow dissector
- Ver. 1.10.2
- Ver. 1.10.1 fix missing ws_symbol_export.h
- Ver. 1.10.2
- Ver. 1.10.1 fix missing ws_symbol_export.h
- Enhance desktop integration (*.desktop and MIME-related
files)
- Add basic OpenFlow dissector
- Ver. 1.10.2
- Ver. 1.10.1 fix missing ws_symbol_export.h
- Ver. 1.10.2
- Ver. 1.10.1 fix missing ws_symbol_export.h
- Enhance desktop integration (*.desktop and MIME-related
files)
- Add basic OpenFlow dissector
- Ver. 1.10.2
- Ver. 1.10.1 fix missing ws_symbol_export.h
- Ver. 1.10.2
- Ver. 1.10.1 fix missing ws_symbol_export.h
- Ver. 1.10.2
- Various security fixes
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=965110"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=965111"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=965112"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=965186"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=965190"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=965192"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=965193"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=965194"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=965195"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=972679"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=972680"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=972681"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=972682"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=972683"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=972684"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=972685"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=972686"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=972687"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=972688"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=990155"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=990156"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=990157"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=990160"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=990163"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=990164"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=990165"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=990166"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=990167"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=990168"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=990169"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=990170"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=990172"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=990175"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=990178"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=990179"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2013-October/117883.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?c9978cc6"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected wireshark package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:wireshark");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:20");
script_set_attribute(attribute:"vuln_publication_date", value:"2013/05/24");
script_set_attribute(attribute:"patch_publication_date", value:"2013/09/26");
script_set_attribute(attribute:"plugin_publication_date", value:"2013/10/03");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^20([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 20.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC20", reference:"wireshark-1.10.2-7.fc20")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "wireshark");
}
Vendor | Product | Version | CPE |
---|---|---|---|
fedoraproject | fedora | wireshark | p-cpe:/a:fedoraproject:fedora:wireshark |
fedoraproject | fedora | 20 | cpe:/o:fedoraproject:fedora:20 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4074
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4075
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4076
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4077
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4078
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4079
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4080
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4081
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4082
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4920
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4921
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4922
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4923
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4924
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4925
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4926
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4927
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4928
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4929
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4931
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935
www.nessus.org/u?c9978cc6
bugzilla.redhat.com/show_bug.cgi?id=965110
bugzilla.redhat.com/show_bug.cgi?id=965111
bugzilla.redhat.com/show_bug.cgi?id=965112
bugzilla.redhat.com/show_bug.cgi?id=965186
bugzilla.redhat.com/show_bug.cgi?id=965190
bugzilla.redhat.com/show_bug.cgi?id=965192
bugzilla.redhat.com/show_bug.cgi?id=965193
bugzilla.redhat.com/show_bug.cgi?id=965194
bugzilla.redhat.com/show_bug.cgi?id=965195
bugzilla.redhat.com/show_bug.cgi?id=972679
bugzilla.redhat.com/show_bug.cgi?id=972680
bugzilla.redhat.com/show_bug.cgi?id=972681
bugzilla.redhat.com/show_bug.cgi?id=972682
bugzilla.redhat.com/show_bug.cgi?id=972683
bugzilla.redhat.com/show_bug.cgi?id=972684
bugzilla.redhat.com/show_bug.cgi?id=972685
bugzilla.redhat.com/show_bug.cgi?id=972686
bugzilla.redhat.com/show_bug.cgi?id=972687
bugzilla.redhat.com/show_bug.cgi?id=972688
bugzilla.redhat.com/show_bug.cgi?id=990155
bugzilla.redhat.com/show_bug.cgi?id=990156
bugzilla.redhat.com/show_bug.cgi?id=990157
bugzilla.redhat.com/show_bug.cgi?id=990160
bugzilla.redhat.com/show_bug.cgi?id=990163
bugzilla.redhat.com/show_bug.cgi?id=990164
bugzilla.redhat.com/show_bug.cgi?id=990165
bugzilla.redhat.com/show_bug.cgi?id=990166
bugzilla.redhat.com/show_bug.cgi?id=990167
bugzilla.redhat.com/show_bug.cgi?id=990168
bugzilla.redhat.com/show_bug.cgi?id=990169
bugzilla.redhat.com/show_bug.cgi?id=990170
bugzilla.redhat.com/show_bug.cgi?id=990172
bugzilla.redhat.com/show_bug.cgi?id=990175
bugzilla.redhat.com/show_bug.cgi?id=990178
bugzilla.redhat.com/show_bug.cgi?id=990179