Fedora 13 : wireshark-1.2.13-2.fc13 (2011-0167)

This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing a security update.

Description :

- Wed Jan 5 2011 Jan Safranek <jsafrane at redhat.com> -
1.2.13-2

- fixed buffer overflow in ENTTEC dissector (#666897)

- Mon Nov 22 2010 Jan Safranek <jsafrane at redhat.com>
- 1.2.13-1

- upgrade to 1.2.13

- see
http://www.wireshark.org/docs/relnotes/wireshark-1.2.1
3.html

- Mon Sep 13 2010 Jan Safranek <jsafrane at redhat.com>
- 1.2.11-1

- upgrade to 1.2.11

- see
http://www.wireshark.org/docs/relnotes/wireshark-1.2.1
1.html

- Resolves: #632539

- Tue Aug 24 2010 Jan Safranek <jsafrane at redhat.com>
- 1.2.10-1

- upgrade to 1.2.10

- see
http://www.wireshark.org/docs/relnotes/wireshark-1.2.1
0.html

- Resolves: #625940 CVE-2010-2287 CVE-2010-2286
CVE-2010-2284 CVE-2010-2283

- Mon May 17 2010 Radek Vokal <rvokal at redhat.com> -
1.2.8-3

- removing traling bracket from python_sitearch
(#592391)

- Fri May 7 2010 Radek Vokal <rvokal at redhat.com> -
1.2.8-2

- add libtool patch

- Fri May 7 2010 Radek Vokal <rvokal at redhat.com> -
1.2.8-1

- use sitearch instead of sitelib to avoid pyo and pyc
conflicts

- upgrade to 1.2.8

- see
http://www.wireshark.org/docs/relnotes/wireshark-1.2.8
.html

- rebuild with GeoIP support (needs to be turned on in
IP protocol preferences)

- bring back -pie

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.wireshark.org/docs/relnotes/wireshark-1.2.10.html
http://www.wireshark.org/docs/relnotes/wireshark-1.2.11.html
http://www.wireshark.org/docs/relnotes/wireshark-1.2.13.html
http://www.wireshark.org/docs/relnotes/wireshark-1.2.8.html
https://bugzilla.redhat.com/show_bug.cgi?id=666894
http://www.nessus.org/u?b7bb23f3

Solution :

Update the affected wireshark package.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Family: Fedora Local Security Checks

Nessus Plugin ID: 51519 ()

Bugtraq ID:

CVE ID: CVE-2010-4538

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now