This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200809-17
(Wireshark: Multiple Denials of Service)
The following vulnerabilities were reported:
Multiple buffer overflows in the NCP dissector (CVE-2008-3146).
Infinite loop in the NCP dissector (CVE-2008-3932).
Invalid read in the tvb_uncompress() function when processing zlib
compressed data (CVE-2008-3933).
Unspecified error when processing Textronix .rf5 files
A remote attacker could exploit these vulnerabilities by sending
specially crafted packets on a network being monitored by Wireshark or
by enticing a user to read a malformed packet trace file, causing a
Denial of Service.
There is no known workaround at this time.
See also :
All Wireshark users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-analyzer/wireshark-1.0.3'
Risk factor :
Critical / CVSS Base Score : 10.0
Family: Gentoo Local Security Checks
Nessus Plugin ID: 34298 (gentoo_GLSA-200809-17.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now