This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.
The remote Mandriva Linux host is missing one or more security
This advisory updates wireshark to the latest version (1.6.2), fixing
several security issues :
The proto_tree_add_item function in Wireshark 1.6.1, when the IKEv1
protocol dissector is used, allows user-assisted remote attackers to
cause a denial of service (infinite loop) via vectors involving a
malformed IKE packet and many items in a tree (CVE-2011-3266).
Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9
and 1.6.x before 1.6.2 allows local users to gain privileges via a
Trojan horse Lua script in an unspecified directory (CVE-2011-3360).
The csnStreamDissector function in epan/dissectors/packet-csn1.c in
the CSN.1 dissector in Wireshark 1.6.x before 1.6.2 does not
initialize a certain structure member, which allows remote attackers
to cause a denial of service (application crash) via a malformed
Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial
of service (application crash) via a malformed capture file that leads
to an invalid root tvbuff, related to a buffer exception handling
The unxorFrame function in epan/dissectors/packet-opensafety.c in the
OpenSafety dissector in Wireshark 1.6.x before 1.6.2 does not properly
validate a certain frame size, which allows remote attackers to cause
a denial of service (loop and application crash) via a malformed
The updated packages have been upgraded to the latest 1.6.x version
(1.6.2) which is not vulnerable to these issues.
Update the affected packages.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true
Family: Mandriva Local Security Checks
Nessus Plugin ID: 61928 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now