This script is Copyright (C) 2009-2015 Tenable Network Security, Inc.
The remote Fedora host is missing a security update.
Various fixes were provided in wireshark 1.2.5 - see
http://www.wireshark.org/docs/relnotes/wireshark-1.2.5.html for more
details. Enhancements - introduced -devel package with autoconf
support - enable Lua support Fedora Bug Fixes - the root warning
dialog no longer shows up The following vulnerabilities have been
fixed. See the security advisory for details and a workaround.
http://www.wireshark.org/security/wnpa- sec-2009-09.html - The
Daintree SNA file parser could overflow a buffer. (Bug 4294)
CVE-2009-4376 - The SMB and SMB2 dissectors could crash. (Bug 4301)
CVE-2009-4377 - The IPMI dissector could crash on Windows. (Bug 4319)
The following bugs have been fixed: - Wireshark does not graph rtp
streams. (Bug 3801) - Wireshark showing extraneous data in a TCP
stream. (Bug 3955) - Wrong decoding of gtp.target identification. (Bug
3974) - TTE dissector bug. (Bug 4247) - Upper case in Lua pref symbol
causes Wireshark to crash. (Bug 4255) - OpenBSD 4.5 build fails at
epan/dissectors/packet-rpcap.c. (Bug 4258) - Incorrect display of
stream data using 'Follow tcp stream' option. (Bug 4288) - Custom
RADIUS dictionary can cause a crash. (Bug 4316) Updated Protocol
Support - DAP, eDonkey, GTP, IPMI, MIP, RADIUS, RANAP, SMB, SMB2, TCP,
TTE, VNC, X.509sat Updated Capture File Support - Daintree SNA.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected wireshark package.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false