Wireshark 2.6.x < 2.6.15 Multiple Vulnerabilities (macOS)

high Nessus Plugin ID 134113

Synopsis

An application installed on the remote macOS / Mac OS X host is affected by multiple vulnerabilities.

Description

The version of Wireshark installed on the remote macOS / Mac OS X host is prior to 2.6.15. It is, therefore, affected by multiple vulnerabilities as referenced in the wireshark-2.6.15 advisory.

- The LTE RRC dissector could leak memory. It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. (wireshark-bug-16341)

- The WiMax DLMAP dissector could crash. It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. (wireshark- bug-16368)

- The EAP dissector could crash. It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. (wireshark-bug-16397)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Wireshark version 2.6.15 or later.

See Also

https://www.wireshark.org/docs/relnotes/wireshark-2.6.15.html

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16341

https://www.wireshark.org/security/wnpa-sec-2020-03

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16368

https://www.wireshark.org/security/wnpa-sec-2020-04

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16397

https://www.wireshark.org/security/wnpa-sec-2020-05

Plugin Details

Severity: High

ID: 134113

File Name: macosx_wireshark_2_6_15.nasl

Version: 1.3

Type: local

Agent: macosx

Published: 2/28/2020

Updated: 4/24/2020

Supported Sensors: Nessus Agent, Nessus

Vulnerability Information

CPE: cpe:/a:wireshark:wireshark

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, installed_sw/Wireshark

Patch Publication Date: 2/26/2020

Vulnerability Publication Date: 2/26/2020

Reference Information

IAVB: 2020-B-0011-S