Lucene search

K
openvasCopyright (C) 2024 Greenbone AGOPENVAS:1361412562310834213
HistoryJun 26, 2024 - 12:00 a.m.

Wireshark Multiple Vulnerabilities (Jun 2024) - Mac OS X

2024-06-2600:00:00
Copyright (C) 2024 Greenbone AG
plugins.openvas.org
4
wireshark
vulnerabilities
mac os x
cve-2024-4853
cve-2024-4854
denial of service
update

CVSS3

6.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H

AI Score

5.4

Confidence

High

EPSS

0

Percentile

16.3%

Wireshark is prone to multiple
vulnerabilities.

# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:wireshark:wireshark";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.834213");
  script_version("2024-07-22T05:05:40+0000");
  script_cve_id("CVE-2024-4853", "CVE-2024-4854");
  script_tag(name:"cvss_base", value:"6.6");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:H/Au:N/C:P/I:P/A:C");
  script_tag(name:"last_modification", value:"2024-07-22 05:05:40 +0000 (Mon, 22 Jul 2024)");
  script_tag(name:"creation_date", value:"2024-06-26 14:13:14 +0530 (Wed, 26 Jun 2024)");
  script_name("Wireshark Multiple Vulnerabilities (Jun 2024) - Mac OS X");

  script_tag(name:"summary", value:"Wireshark is prone to multiple
  vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present
  on the target host.");

  script_tag(name:"insight", value:"These vulnerabilities exist:

  - CVE-2024-4853: Memory handling issue in editcap.

  - CVE-2024-4854: An error in MONGO and ZigBee TLV dissector infinite loops in Wireshark.");

  script_tag(name:"impact", value:"Successful exploitation allows an attacker
  to cause denial of service.");

  script_tag(name:"affected", value:"Wireshark version 3.6.0 through 3.6.22,
  4.0.0 through 4.0.14 and 4.2.0 through 4.2.4 on Mac OS X.");

  script_tag(name:"solution", value:"Update to version 3.6.23, 4.0.15 or 4.2.5
  or later.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"executable_version");
  script_xref(name:"URL", value:"https://www.wireshark.org/security/wnpa-sec-2024-07.html");
  script_xref(name:"URL", value:"https://www.wireshark.org/security/wnpa-sec-2024-08.html");
  script_copyright("Copyright (C) 2024 Greenbone AG");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_dependencies("gb_wireshark_detect_macosx.nasl");
  script_mandatory_keys("wireshark/macosx/detected");
  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if(!infos = get_app_version_and_location(cpe: CPE, exit_no_version: TRUE))
  exit(0);

version = infos["version"];
location = infos["location"];

if(version_in_range( version: version, test_version: "3.6.0", test_version2: "3.6.22")) {
  fix = "3.6.23";
}

if(version_in_range(version: version, test_version: "4.0.0", test_version2: "4.0.14")) {
  fix = "4.0.15";
}

if(version_in_range(version: version, test_version: "4.2.0", test_version2: "4.2.4")) {
  fix = "4.2.5";
}

if(fix) {
  report = report_fixed_ver(installed_version: version, fixed_version: fix, install_path: location);
  security_message(port: 0, data: report);
  exit(0);
}

exit(99);

CVSS3

6.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H

AI Score

5.4

Confidence

High

EPSS

0

Percentile

16.3%