Lucene search

K
openvasCopyright (C) 2008 Greenbone Networks GmbHOPENVAS:800040
HistoryOct 24, 2008 - 12:00 a.m.

Wireshark Multiple Vulnerabilities - Oct08 (Windows)

2008-10-2400:00:00
Copyright (C) 2008 Greenbone Networks GmbH
plugins.openvas.org
11

EPSS

0.016

Percentile

87.4%

The Remote host is installed with Wireshark, and is prone to
multiple security vulnerabilities.

###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_wireshark_mult_vuln_oct08_win.nasl 6519 2017-07-04 14:08:14Z cfischer $
#
# Wireshark Multiple Vulnerabilities - Oct08 (Windows)
#
# Authors:
# Chandan S <[email protected]>
#
# Copyright:
# Copyright (c) 2008 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

tag_impact = "Successful attacks may cause the application to crash via specially
  crafted packets.
  Impact Level: Application";
tag_affected = "Wireshark versions prior to 1.0.4 on Windows";
tag_insight = "Multiple flaws are due to,
  a. an error within the Bluetooth ACL dissector, PRP or MATE post dissector.
     Versions 0.99.2 through 1.0.3 are affected by this vulnerability.
  b. an error within the Q.931 dissector. Versions 0.10.3 through 1.0.3
     are affected by this vulnerability.
  c. an uninitialized data structures within the Bluetooth RFCOMM and USB
     Request Block (URB) dissector. Versions 0.99.7 through 1.0.3 are
     affected by this vulnerabiliy.";
tag_solution = "Upgrade to Wireshark 1.0.4
  http://www.wireshark.org/download.html";
tag_summary = "The Remote host is installed with Wireshark, and is prone to
  multiple security vulnerabilities.";

if(description)
{
  script_id(800040);
  script_version("$Revision: 6519 $");
  script_tag(name:"last_modification", value:"$Date: 2017-07-04 16:08:14 +0200 (Tue, 04 Jul 2017) $");
  script_tag(name:"creation_date", value:"2008-10-24 15:11:55 +0200 (Fri, 24 Oct 2008)");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_cve_id("CVE-2008-4680", "CVE-2008-4681", "CVE-2008-4682",
                "CVE-2008-4683", "CVE-2008-4684", "CVE-2008-4685");
  script_bugtraq_id(31838);
  script_name("Wireshark Multiple Vulnerabilities - Oct08 (Windows)");
  script_xref(name : "URL" , value : "http://www.wireshark.org/security/wnpa-sec-2008-06.html");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2008 Greenbone Networks GmbH");
  script_family("Denial of Service");
  script_dependencies("gb_wireshark_detect_win.nasl");
  script_mandatory_keys("Wireshark/Win/Ver");
  script_tag(name : "impact" , value : tag_impact);
  script_tag(name : "affected" , value : tag_affected);
  script_tag(name : "insight" , value : tag_insight);
  script_tag(name : "solution" , value : tag_solution);
  script_tag(name : "summary" , value : tag_summary);
  script_tag(name:"qod_type", value:"registry");
  script_tag(name:"solution_type", value:"VendorFix");
  exit(0);
}


include("version_func.inc");

sharkVer = get_kb_item("Wireshark/Win/Ver");
if(!sharkVer){
  exit(0);
}

if(version_in_range(version:sharkVer, test_version:"0.99.2",
                    test_version2:"1.0.3")){
  security_message(0);
}