GLSA-200608-26 : Wireshark: Multiple vulnerabilities

This script is Copyright (C) 2006-2015 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-200608-26
(Wireshark: Multiple vulnerabilities)

The following vulnerabilities have been discovered in Wireshark.
Firstly, if the IPsec ESP parser is used it is susceptible to
off-by-one errors, this parser is disabled by default; secondly, the
SCSI dissector is vulnerable to an unspecified crash; and finally, the
Q.2931 dissector of the SSCOP payload may use all the available memory
if a port range is configured. By default, no port ranges are
configured.

Impact :

An attacker might be able to exploit these vulnerabilities, resulting
in a crash or the execution of arbitrary code with the permissions of
the user running Wireshark, possibly the root user.

Workaround :

Disable the SCSI and Q.2931 dissectors with the 'Analyse' and 'Enabled
protocols' menus. Make sure the ESP decryption is disabled, with the
'Edit -> Preferences -> Protocols -> ESP' menu.

See also :

http://www.wireshark.org/security/wnpa-sec-2006-02.html
https://security.gentoo.org/glsa/200608-26

Solution :

All Wireshark users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-analyzer/wireshark-0.99.3'

Risk factor :

Medium / CVSS Base Score : 5.4
(CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:C)

Family: Gentoo Local Security Checks

Nessus Plugin ID: 22288 (gentoo_GLSA-200608-26.nasl)

Bugtraq ID:

CVE ID: CVE-2006-4330
CVE-2006-4331
CVE-2006-4332
CVE-2006-4333

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now