Wireshark / Ethereal 0.99.2 to 1.0.6 Multiple Vulnerabilities

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.


Synopsis :

The remote host has an application that is affected by multiple
vulnerabilities.

Description :

The installed version of Wireshark or Ethereal is affected by multiple
issues :

- The PROFINET dissector is affected by a format string
vulnerability which an attacker could exploit to execute
arbitrary code. (Bug 3372)

- Wireshark could crash while reading a malformed LDAP
capture file. (Bug 3262)

- Wireshark could crash while reading a malformed Check
Point High-Availability Protocol capture file.
(Bug 3269)

- Wireshark could crash while reading a Tektronix .rf5
capture file. (Bug 3366)

See also :

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3382
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3262
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3269
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3366
http://www.wireshark.org/security/wnpa-sec-2009-02.html
http://www.wireshark.org/docs/relnotes/wireshark-1.0.7.html

Solution :

Upgrade to Wireshark 1.0.7 or later.

Risk factor :

High / CVSS Base Score : 7.6
(CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.0
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 36127 ()

Bugtraq ID: 34291
34457

CVE ID: CVE-2009-1210
CVE-2009-1267
CVE-2009-1268
CVE-2009-1269

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now