GLSA-200608-26 : Wireshark: Multiple vulnerabilities

medium Nessus Plugin ID 22288

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200608-26 (Wireshark: Multiple vulnerabilities)

The following vulnerabilities have been discovered in Wireshark.
Firstly, if the IPsec ESP parser is used it is susceptible to off-by-one errors, this parser is disabled by default; secondly, the SCSI dissector is vulnerable to an unspecified crash; and finally, the Q.2931 dissector of the SSCOP payload may use all the available memory if a port range is configured. By default, no port ranges are configured.
Impact :

An attacker might be able to exploit these vulnerabilities, resulting in a crash or the execution of arbitrary code with the permissions of the user running Wireshark, possibly the root user.
Workaround :

Disable the SCSI and Q.2931 dissectors with the 'Analyse' and 'Enabled protocols' menus. Make sure the ESP decryption is disabled, with the 'Edit -> Preferences -> Protocols -> ESP' menu.

Solution

All Wireshark users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-analyzer/wireshark-0.99.3'

See Also

https://www.wireshark.org/security/wnpa-sec-2006-02.html

https://security.gentoo.org/glsa/200608-26

Plugin Details

Severity: Medium

ID: 22288

File Name: gentoo_GLSA-200608-26.nasl

Version: 1.15

Type: local

Published: 8/30/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5.4

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:wireshark, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 8/29/2006

Reference Information

CVE: CVE-2006-4330, CVE-2006-4331, CVE-2006-4332, CVE-2006-4333

CWE: 399

GLSA: 200608-26