Wireshark 1.4.x < 1.4.10 Multiple Vulnerabilities

medium Nessus Plugin ID 56689

Synopsis

The remote Windows host contains an application that is affected by multiple vulnerabilities.

Description

The installed version of Wireshark is 1.4.x before 1.4.10. This version is affected by the following vulnerabilities :

- An error exists in the Infiniband dissector that can allow a NULL pointer to be dereferenced when processing certain malformed packets. (CVE-2011-4101)

- A buffer overflow exists in the ERF file reader and can be triggered when processing certain malformed packets.
(CVE-2011-4102)

Solution

Upgrade to Wireshark version 1.4.10 or later.

See Also

https://www.wireshark.org/security/wnpa-sec-2011-18.html

https://www.wireshark.org/security/wnpa-sec-2011-19.html

https://www.wireshark.org/docs/relnotes/wireshark-1.4.10.html

Plugin Details

Severity: Medium

ID: 56689

File Name: wireshark_1_4_10.nasl

Version: 1.7

Type: local

Agent: windows

Family: Windows

Published: 11/2/2011

Updated: 3/9/2023

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/a:wireshark:wireshark

Required KB Items: SMB/Wireshark/Installed

Exploit Ease: No known exploits are available

Patch Publication Date: 11/1/2011

Vulnerability Publication Date: 11/1/2011

Reference Information

CVE: CVE-2011-4101, CVE-2011-4102

BID: 50481, 50486