Wireshark 2.0.x < 2.0.5 Multiple DoS

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an application installed that is affected
by multiple denial of service vulnerabilities.

Description :

The version of Wireshark installed on the remote Windows host is 2.0.x
prior to 2.0.5. It is, therefore, affected by multiple denial of
service vulnerabilities :

- A denial of service vulnerability exists in the CORBA
IDL dissector due to improper handling of packets. An
unauthenticated, remote attacker can exploit this, via a
specially crafted packet or packet trace file, to cause
an application crash. Note that this vulnerability only
affects 64-bit versions of Windows. (CVE-2016-6503)

- A denial of service vulnerability exists due to a
divide-by-zero flaw in the dissect_pbb_tlvblock()
function in packet-packetbb.c. An unauthenticated,
remote attacker can exploit this, via a specially
crafted packet or packet trace file, to cause an
application crash. (CVE-2016-6505)

- A flaw exists in the add_headers() function in
packet_wsp.c that is triggered when an offset of zero is
returned by the wkh_content_disposition() function. An
unauthenticated, remote attacker can exploit this, via a
specially crafted packet or packet trace file, to cause
an infinite loop, resulting in a denial of service
condition. (CVE-2016-6506)

- A denial of service vulnerability exists due to an
incorrect integer data type used in the rlc_decode_li()
function in packet-rlc.c. An unauthenticated, remote
attacker can exploit this, via a specially crafted
packet or packet trace file, to cause a long loop and
excessive CPU resource consumption, resulting in a
denial of service condition. (CVE-2016-6508)

- A denial of service vulnerability exists in the
dissect_ldss_transfer() function in packet-ldss.c that
is triggered when recreating a conversation that already
exists. An unauthenticated, remote attacker can exploit
this, via a specially crafted packet or packet trace
file, to cause an application crash. (CVE-2016-6509)

- An overflow condition exists in the rlc_decode_li()
function in packet-rlc.c due to improper validation of
user-supplied input. An unauthenticated, remote attacker
can exploit this, via a specially crafted packet or
packet trace file, to cause a stack-based buffer
overflow, resulting in a denial of service condition.
(CVE-2016-6510)

- A denial of service vulnerability exists in the
proto_tree_add_text_valist_internal() function in
proto.c due to improper handling of packets. An
unauthenticated, remote attacker can exploit this, via a
specially crafted packet or packet trace file, to cause
a long loop and excessive CPU resource consumption.
(CVE-2016-6511)

- Multiple flaws exist in the MMSE, WAP, WBXML, and WSP
dissectors due to improper handling of packets. An
unauthenticated, remote attacker can exploit these
issues, via a specially crafted packet or packet trace
file, to cause an infinite loop, resulting in a denial
of service condition. (CVE-2016-6512)

- A denial of service vulnerability exists in the
parse_wbxml_tag_defined() function in packet-wbxml.c due
to improper handling of packets. An unauthenticated,
remote attacker can exploit this, via a specially
crafted packet or packet trace file, to cause an
application crash. (CVE-2016-6513)

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.

See also :

https://www.wireshark.org/security/wnpa-sec-2016-39.html
https://www.wireshark.org/security/wnpa-sec-2016-41.html
https://www.wireshark.org/security/wnpa-sec-2016-42.html
https://www.wireshark.org/security/wnpa-sec-2016-44.html
https://www.wireshark.org/security/wnpa-sec-2016-45.html
https://www.wireshark.org/security/wnpa-sec-2016-46.html
https://www.wireshark.org/security/wnpa-sec-2016-47.html
https://www.wireshark.org/security/wnpa-sec-2016-48.html
https://www.wireshark.org/security/wnpa-sec-2016-49.html
https://www.wireshark.org/docs/relnotes/wireshark-2.0.5.html

Solution :

Upgrade to Wireshark version 2.0.5 or later.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.4
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now