CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:A/AC:M/Au:N/C:N/I:N/A:P
EPSS
Percentile
72.0%
The installed version of Wireshark 1.8 is earlier than 1.8.5. It is, therefore, affected by the following vulnerabilities :
Errors exist related to the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors that could allow the application to enter infinite or large loops, thereby consuming excessive CPU resources. (Bugs 8036, 8037, 8038, 8040, 8041, 8042, 8043, 8198, 8199, 8222)
Errors exist related to the DCP-ETSI, ROHC, DTLS, MS-MMC, DTN, CLNP dissectors that could allow them to crash. (Bugs 7679, 7871, 7945, 8111, 8112, 8213)
An unspecified error could allow the dissection engine to crash. (Bug 8197)
An unspecified buffer overflow exists in the NTLMSSP dissector that has an unspecified impact.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(64362);
script_version("1.12");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/03/09");
script_cve_id(
"CVE-2013-1572",
"CVE-2013-1573",
"CVE-2013-1574",
"CVE-2013-1575",
"CVE-2013-1576",
"CVE-2013-1577",
"CVE-2013-1578",
"CVE-2013-1579",
"CVE-2013-1580",
"CVE-2013-1581",
"CVE-2013-1582",
"CVE-2013-1583",
"CVE-2013-1584",
"CVE-2013-1585",
"CVE-2013-1586",
"CVE-2013-1587",
"CVE-2013-1588",
"CVE-2013-1589",
"CVE-2013-1590"
);
script_bugtraq_id(
57615,
57616,
57618,
57619,
57620,
57621,
57622,
57625,
57626,
57647
);
script_name(english:"Wireshark 1.8.x < 1.8.5 Multiple Vulnerabilities");
script_summary(english:"Does a version check");
script_set_attribute(attribute:"synopsis", value:
"The remote Windows host contains an application that is affected by
multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The installed version of Wireshark 1.8 is earlier than 1.8.5. It is,
therefore, affected by the following vulnerabilities :
- Errors exist related to the Bluetooth HCI, CSN.1,
DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols,
MPLS, R3, RTPS, SDP, and SIP dissectors that could
allow the application to enter infinite or large loops,
thereby consuming excessive CPU resources. (Bugs 8036,
8037, 8038, 8040, 8041, 8042, 8043, 8198, 8199, 8222)
- Errors exist related to the DCP-ETSI, ROHC, DTLS,
MS-MMC, DTN, CLNP dissectors that could allow them to
crash. (Bugs 7679, 7871, 7945, 8111, 8112, 8213)
- An unspecified error could allow the dissection engine
to crash. (Bug 8197)
- An unspecified buffer overflow exists in the NTLMSSP
dissector that has an unspecified impact.");
script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2013-01.html");
script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2013-02.html");
script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2013-03.html");
script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2013-04.html");
script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2013-05.html");
script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2013-06.html");
script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2013-07.html");
script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2013-08.html");
script_set_attribute(attribute:"see_also", value:"https://www.wireshark.org/security/wnpa-sec-2013-09.html");
script_set_attribute(attribute:"see_also", value:"http://www.wireshark.org/docs/relnotes/wireshark-1.8.5.html");
script_set_attribute(attribute:"solution", value:
"Upgrade to Wireshark version 1.8.5 or later.");
script_set_cvss_base_vector("CVSS2#AV:A/AC:M/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-1590");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2013/01/29");
script_set_attribute(attribute:"patch_publication_date", value:"2013/01/29");
script_set_attribute(attribute:"plugin_publication_date", value:"2013/01/30");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:wireshark:wireshark");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2013-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("wireshark_installed.nasl");
script_require_keys("SMB/Wireshark/Installed");
exit(0);
}
include('vcf.inc');
get_kb_item_or_exit('SMB/Registry/Enumerated');
var app_info = vcf::get_app_info(app:'Wireshark', win_local:TRUE);
var constraints = [
{ 'min_version' : '1.8.0', 'max_version' : '1.8.4', 'fixed_version' : '1.8.5' }
];
vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1572
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1573
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1574
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1575
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1576
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1577
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1578
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1579
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1580
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1581
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1582
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1583
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1584
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1585
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1586
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1587
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1588
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1589
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1590
www.wireshark.org/docs/relnotes/wireshark-1.8.5.html
www.wireshark.org/security/wnpa-sec-2013-01.html
www.wireshark.org/security/wnpa-sec-2013-02.html
www.wireshark.org/security/wnpa-sec-2013-03.html
www.wireshark.org/security/wnpa-sec-2013-04.html
www.wireshark.org/security/wnpa-sec-2013-05.html
www.wireshark.org/security/wnpa-sec-2013-06.html
www.wireshark.org/security/wnpa-sec-2013-07.html
www.wireshark.org/security/wnpa-sec-2013-08.html
www.wireshark.org/security/wnpa-sec-2013-09.html