Wireshark 2.0.x < 2.0.4 Multiple DoS

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an application installed that is affected
by multiple denial of service vulnerabilities.

Description :

The version of Wireshark installed on the remote Windows host is
2.0.x prior to 2.0.4. It is, therefore, affected by multiple denial
of service vulnerabilities :

- An infinite loop exists in the SPOOLs dissector. A
remote attacker, via a specially crafted packet or trace
file, can exploit this to exhaust CPU resources,
resulting in a denial of service condition.
(CVE-2016-5350)

- A flaw exists in the IEEE 802.11 dissector that is
triggered when handling a malformed packet or trace
file. A remote attacker can exploit this to cause a
denial of service condition. (CVE-2016-5351)

- An out-of-bounds read error exists in the
AirPDcapDecryptWPABroadcastKey() function in airpdcap.c
that allows a remote attacker to disclose memory
contents or cause a denial of service condition.
(CVE-2016-5352)

- A flaw exists in the UMTS FP dissector that is triggered
when handling a malformed packet or trace file. A remote
attacker can exploit this to cause a denial of service
condition. (CVE-2016-5353)

- A flaw exists in multiple USB dissectors that is
triggered when a handling malformed packet or trace
file. A remote attacker can exploit this to cause a
denial of service condition. (CVE-2016-5354)

- A flaw exists in the Toshiba file parser that is
triggered when handling a malformed packet trace file. A
remote attacker can exploit this, by convincing a user
to open a specially crafted packet trace file, to cause
a denial of service condition. (CVE-2016-5355)

- A flaw exists in the CoSine file parser that is
triggered when handling a malformed packet trace file. A
remote attacker can exploit this to cause a denial of
service condition. (CVE-2016-5356)

- A flaw exists in the NetScreen file parser that is
triggered when handling a malformed packet trace file. A
remote attacker can exploit this to cause a denial of
service condition. (CVE-2016-5357)

- A flaw exists in the Ethernet dissector that is
triggered when handling a malformed packet or trace
file. A remote attacker can exploit this to cause a
denial of service condition. (CVE-2016-5358)

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.

See also :

https://www.wireshark.org/security/wnpa-sec-2016-29.html
https://www.wireshark.org/security/wnpa-sec-2016-30.html
https://www.wireshark.org/security/wnpa-sec-2016-31.html
https://www.wireshark.org/security/wnpa-sec-2016-32.html
https://www.wireshark.org/security/wnpa-sec-2016-33.html
https://www.wireshark.org/security/wnpa-sec-2016-34.html
https://www.wireshark.org/security/wnpa-sec-2016-35.html
https://www.wireshark.org/security/wnpa-sec-2016-36.html
https://www.wireshark.org/security/wnpa-sec-2016-37.html
https://www.wireshark.org/docs/relnotes/wireshark-2.0.4.html

Solution :

Upgrade to Wireshark version 2.0.4 or later.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.4
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now