Wireshark / Ethereal Dissector LWRES Multiple Buffer Overflows

high Nessus Plugin ID 44338

Language:

Synopsis

The remote host has an application that is affected by several buffer overflows.

Description

The installed version of Wireshark or Ethereal is potentially vulnerable to attack by handling data associated with the LWRES dissector.

These vulnerabilities can result in a denial of service, or possibly arbitrary code execution. A remote attacker can exploit these issues by tricking a user into opening a maliciously crafted capture file. Additionally, if Wireshark is running in promiscuous mode, one of these issues can be exploited remotely.

Solution

Upgrade to Wireshark version 1.0.11 / 1.2.6 or later.

See Also

http://www.wireshark.org/security/wnpa-sec-2010-02.html

Plugin Details

Severity: High

ID: 44338

File Name: wireshark_1_2_6.nasl

Version: 1.14

Type: local

Agent: windows

Family: Windows

Published: 1/29/2010

Updated: 3/9/2023

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:wireshark:wireshark

Required KB Items: SMB/Wireshark/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/27/2009

Vulnerability Publication Date: 1/27/2010

Exploitable With

CANVAS (White_Phosphorus)

Core Impact

Metasploit (Wireshark LWRES Dissector getaddrsbyname_request Buffer Overflow (loop))

Reference Information

CVE: CVE-2010-0304

BID: 37985

CWE: 119