FreeBSD : Wireshark -- DoS in the BER-based dissectors (b2eaa7c2-e64a-11df-bc65-0022156e8794)

This script is Copyright (C) 2010-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Secunia reports :

A vulnerability has been discovered in Wireshark, which can be
exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an infinite recursion error in the
'dissect_unknown_ber()' function in epan/dissectors/packet-ber.c and
can be exploited to cause a stack overflow e.g. via a specially
crafted SNMP packet.

The vulnerability is confirmed in version 1.4.0 and reported in
version 1.2.11 and prior and version 1.4.0 and prior.

See also :

http://www.wireshark.org/lists/wireshark-announce/201010/msg00002.html
http://www.wireshark.org/lists/wireshark-announce/201010/msg00001.html
http://www.nessus.org/u?47092a51

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 50500 ()

Bugtraq ID:

CVE ID: CVE-2010-3445

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now