GLSA-200608-26 : Wireshark: Multiple vulnerabilities

This script is Copyright (C) 2006-2015 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-200608-26
(Wireshark: Multiple vulnerabilities)

The following vulnerabilities have been discovered in Wireshark.
Firstly, if the IPsec ESP parser is used it is susceptible to
off-by-one errors, this parser is disabled by default; secondly, the
SCSI dissector is vulnerable to an unspecified crash; and finally, the
Q.2931 dissector of the SSCOP payload may use all the available memory
if a port range is configured. By default, no port ranges are

Impact :

An attacker might be able to exploit these vulnerabilities, resulting
in a crash or the execution of arbitrary code with the permissions of
the user running Wireshark, possibly the root user.

Workaround :

Disable the SCSI and Q.2931 dissectors with the 'Analyse' and 'Enabled
protocols' menus. Make sure the ESP decryption is disabled, with the
'Edit -> Preferences -> Protocols -> ESP' menu.

See also :

Solution :

All Wireshark users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-analyzer/wireshark-0.99.3'

Risk factor :

Medium / CVSS Base Score : 5.4

Family: Gentoo Local Security Checks

Nessus Plugin ID: 22288 (gentoo_GLSA-200608-26.nasl)

Bugtraq ID:

CVE ID: CVE-2006-4330

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now