Wireshark 1.8.x < 1.8.13 Multiple Vulnerabilities

high Nessus Plugin ID 72941

Synopsis

The remote Windows host contains an application that is affected by multiple vulnerabilities.

Description

The installed version of Wireshark 1.8.x is a version prior to 1.8.13. It is, therefore, affected by denial of service vulnerabilities in the following dissectors :

- NFS dissector (CVE-2014-2281)
- RLC dissector (CVE-2014-2283)

Additionally, a flaw exists in the 'mpeg_read()' function in the MPEG file parser, 'wiretap/mpeg.c', where input is not properly sanitized when handling oversized records. A context-dependent attacker could cause a buffer overflow with a specially crafted packet trace file, resulting in a denial of service or potentially arbitrary code execution. (CVE-2014-2299)

Solution

Upgrade to Wireshark version 1.8.13 or later.

See Also

https://www.wireshark.org/security/wnpa-sec-2014-01.html

https://www.wireshark.org/security/wnpa-sec-2014-03.html

https://www.wireshark.org/security/wnpa-sec-2014-04.html

https://www.wireshark.org/lists/wireshark-announce/201403/msg00001.html

Plugin Details

Severity: High

ID: 72941

File Name: wireshark_1_8_13.nasl

Version: 1.13

Type: local

Agent: windows

Family: Windows

Published: 3/11/2014

Updated: 3/9/2023

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:wireshark:wireshark

Required KB Items: SMB/Wireshark/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/7/2014

Vulnerability Publication Date: 3/7/2014

Exploitable With

Core Impact

Metasploit (Wireshark wiretap/mpeg.c Stack Buffer Overflow)

Reference Information

CVE: CVE-2014-2281, CVE-2014-2283, CVE-2014-2299

BID: 66066, 66068, 66072