CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
EPSS
Percentile
94.0%
The installed version of Wireshark or Ethereal is affected by multiple issues :
The GSM A RR dissector could crash. (Bug 3893)
The OpcUa dissector could use excessive CPU and memory.
(Bug 3986)
The TLS dissector could crash on some platforms.
(Bug 4008)
Wireshark could crash while reading an ‘ERF’ file. (Bug 3849)
These vulnerabilities could result in a denial of service. A remote attacker could exploit these issues by tricking a user into opening a maliciously crafted capture file. Additionally, if Wireshark is running in promiscuous mode, one of these issues could be exploited remotely (from the same network segment).
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(40999);
script_version("1.17");
script_cve_id("CVE-2009-3241", "CVE-2009-3242", "CVE-2009-3243");
script_bugtraq_id(36408,36591);
script_xref(name:"Secunia", value:"36754");
script_name(english:"Wireshark / Ethereal 0.9.6 to 1.2.1 Multiple Vulnerabilities");
script_summary(english:"Does a version check");
script_set_attribute( attribute:"synopsis", value:
"The remote host has an application that is affected by multiple
vulnerabilities." );
script_set_attribute( attribute:"description", value:
"The installed version of Wireshark or Ethereal is affected by
multiple issues :
- The GSM A RR dissector could crash. (Bug 3893)
- The OpcUa dissector could use excessive CPU and memory.
(Bug 3986)
- The TLS dissector could crash on some platforms.
(Bug 4008)
- Wireshark could crash while reading an 'ERF' file.
(Bug 3849)
These vulnerabilities could result in a denial of service. A remote
attacker could exploit these issues by tricking a user into opening a
maliciously crafted capture file. Additionally, if Wireshark is
running in promiscuous mode, one of these issues could be exploited
remotely (from the same network segment)." );
script_set_attribute(
attribute:"see_also",
value:"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3893"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3986"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4008"
);
script_set_attribute(
attribute:"see_also",
value:"http://www.wireshark.org/security/wnpa-sec-2009-06.html"
);
script_set_attribute(
attribute:"solution",
value:"Upgrade to Wireshark version 1.2.2 or later."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(
attribute:"vuln_publication_date",
value:"2009/09/15"
);
script_set_attribute(
attribute:"patch_publication_date",
value:"2009/09/15"
);
script_set_attribute(
attribute:"plugin_publication_date",
value:"2009/09/16"
);
script_set_attribute(attribute:"plugin_modification_date", value:"2023/03/09");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:wireshark:wireshark");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2009-2023 Tenable Network Security, Inc.");
script_dependencies("wireshark_installed.nasl");
script_require_keys("SMB/Wireshark/Installed");
exit(0);
}
include('vcf.inc');
get_kb_item_or_exit('SMB/Registry/Enumerated');
var app_info = vcf::get_app_info(app:'Wireshark', win_local:TRUE);
var constraints = [
{ 'min_version' : '0.99.6', 'max_version' : '1.2.1', 'fixed_version' : '1.2.2' }
];
vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3241
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3242
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3243
www.wireshark.org/security/wnpa-sec-2009-06.html
bugs.wireshark.org/bugzilla/show_bug.cgi?id=3893
bugs.wireshark.org/bugzilla/show_bug.cgi?id=3986
bugs.wireshark.org/bugzilla/show_bug.cgi?id=4008