Oracle Solaris Third-Party Patch Update : wireshark (multiple_vulnerabilities_in_wireshark10)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Solaris system is missing a security patch for third-party
software.

Description :

The remote Solaris system is missing necessary patches to address
security updates :

- The nfs_name_snoop_add_name function in
epan/dissectors/packet-nfs.c in the NFS dissector in
Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6
does not validate a certain length value, which allows
remote attackers to cause a denial of service (memory
corruption and application crash) via a crafted NFS
packet. (CVE-2014-2281)

- The dissect_protocol_data_parameter function in
epan/dissectors/packet-m3ua.c in the M3UA dissector in
Wireshark 1.10.x before 1.10.6 does not properly
allocate memory, which allows remote attackers to cause
a denial of service (application crash) via a crafted
SS7 MTP3 packet. (CVE-2014-2282)

- epan/dissectors/packet-rlc in the RLC dissector in
Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6
uses inconsistent memory-management approaches, which
allows remote attackers to cause a denial of service
(use-after-free error and application crash) via a
crafted UMTS Radio Link Control packet. (CVE-2014-2283)

See also :

http://www.nessus.org/u?b5f8def1
http://www.nessus.org/u?1dba4630

Solution :

Upgrade to Solaris 11.1.19.6.0.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)

Family: Solaris Local Security Checks

Nessus Plugin ID: 80812 ()

Bugtraq ID:

CVE ID: CVE-2014-2281
CVE-2014-2282
CVE-2014-2283

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now