This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
The Wireshark team reports of multiple vulnerabilities :
- Wireshark could crash when reading an MP3 file.
- Beyond Security discovered that Wireshark could loop excessively
while reading a malformed DNP packet.
- Stefan Esser discovered a buffer overflow in the SSL dissector.
- The ANSI MAP dissector could be susceptible to a buffer overflow on
- The Firebird/Interbase dissector could go into an infinite loop or
- The NCP dissector could cause a crash.
- The HTTP dissector could crash on some systems while decoding
- The MEGACO dissector could enter a large loop and consume system
- The DCP ETSI dissector could enter a large loop and consume system
- Fabiodds discovered a buffer overflow in the iSeries (OS/400)
Communication trace file parser.
- The PPP dissector could overflow a buffer.
- The Bluetooth SDP dissector could go into an infinite loop.
- A malformed RPC Portmap packet could cause a crash.
- The IPv6 dissector could loop excessively.
- The USB dissector could loop excessively or crash.
- The SMB dissector could crash.
- The RPL dissector could go into an infinite loop.
- The WiMAX dissector could crash due to unaligned access on some
- The CIP dissector could attempt to allocate a huge amount of memory
and crash. Impact It may be possible to make Wireshark or Ethereal
crash or use up available memory by injecting a purposefully malformed
packet onto the wire or by convincing someone to read a malformed
packet trace file.
See also :
Update the affected packages.
Risk factor :
Critical / CVSS Base Score : 10.0
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 29772 (freebsd_pkg_8a835235ae8411dca5f9001a4d49522b.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now