Wireshark 1.10.x < 1.10.9 Multiple DoS Vulnerabilities

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains an application that is affected by
multiple denial of service vulnerabilities.

Description :

The installed version of Wireshark is version 1.10.x prior to 1.10.9.
It is, therefore, affected by the following vulnerabilities :

- A buffer underflow flaw exists in the 'dissect_log'
function of the IrDA dissector, which is triggered when
handling malformed packets. Using a specially crafted
packet, a remote attacker could cause a denial of
service by crashing the application. (CVE-2014-5161)

- A buffer underflow flaw exists in the 'read_new_line'
function of the DCT2000 dissector, which is triggered
when handling malformed packets. Using a specially
crafted packet, a remote attacker could cause a denial
of service by crashing the application. (CVE-2014-5162)

- An APN decode flaw exists in the GTP and GSM Management
dissectors, which is triggered when handling malformed
packets. Using a specially crafted packet, a remote
attacker could cause a denial of service by crashing the
application. (CVE-2014-5163)

- An initialization flaw exists in the 'rlc_decode_li'
function of the RLC dissector, which is triggered when
handling malformed packets. Using a specially crafted
packet, a remote attacker could cause a denial of
service by crashing the application. (CVE-2014-5164)

- A padding validation flaw exists within the ASN.1 BER
dissector, which is triggered when handling malformed
packets. Using a specially crafted packet, a remote
attacker could cause a denial of service by crashing
the application. (CVE-2014-5165)

Note that Nessus has not tested for this issue but has instead relied
only on the application's self-reported version number.

See also :

https://www.wireshark.org/security/wnpa-sec-2014-08.html
https://www.wireshark.org/security/wnpa-sec-2014-09.html
https://www.wireshark.org/security/wnpa-sec-2014-10.html
https://www.wireshark.org/security/wnpa-sec-2014-11.html
http://www.wireshark.org/docs/relnotes/wireshark-1.10.9.html

Solution :

Upgrade to Wireshark version 1.10.9 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 76992 ()

Bugtraq ID: 69000
69001
69002
69003
69005

CVE ID: CVE-2014-5161
CVE-2014-5162
CVE-2014-5163
CVE-2014-5164
CVE-2014-5165

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now