https://security-tracker.debian.org/tracker/source-package/wireshark
https://security-tracker.debian.org/tracker/CVE-2021-4181
https://security-tracker.debian.org/tracker/CVE-2021-4182
https://security-tracker.debian.org/tracker/CVE-2021-4184
https://security-tracker.debian.org/tracker/CVE-2021-4185
https://security-tracker.debian.org/tracker/CVE-2021-4186
https://security-tracker.debian.org/tracker/CVE-2021-4190
https://security-tracker.debian.org/tracker/CVE-2022-0581
https://security-tracker.debian.org/tracker/CVE-2022-0582
https://security-tracker.debian.org/tracker/CVE-2022-0583
https://security-tracker.debian.org/tracker/CVE-2022-0585
https://security-tracker.debian.org/tracker/CVE-2022-0586
https://security-tracker.debian.org/tracker/CVE-2022-3190
https://security-tracker.debian.org/tracker/CVE-2022-4344
https://security-tracker.debian.org/tracker/CVE-2022-4345
https://security-tracker.debian.org/tracker/CVE-2023-0411
https://security-tracker.debian.org/tracker/CVE-2023-0412
https://security-tracker.debian.org/tracker/CVE-2023-0413
https://security-tracker.debian.org/tracker/CVE-2023-0415
https://security-tracker.debian.org/tracker/CVE-2023-0416
https://security-tracker.debian.org/tracker/CVE-2023-0417
https://security-tracker.debian.org/tracker/CVE-2023-0666
https://security-tracker.debian.org/tracker/CVE-2023-0667
https://security-tracker.debian.org/tracker/CVE-2023-0668
https://security-tracker.debian.org/tracker/CVE-2023-1161
https://security-tracker.debian.org/tracker/CVE-2023-1992
https://security-tracker.debian.org/tracker/CVE-2023-1993
https://security-tracker.debian.org/tracker/CVE-2023-1994
https://security-tracker.debian.org/tracker/CVE-2023-2855
https://security-tracker.debian.org/tracker/CVE-2023-2856
https://security-tracker.debian.org/tracker/CVE-2023-2858
https://security-tracker.debian.org/tracker/CVE-2023-2879
https://security-tracker.debian.org/tracker/CVE-2023-2906
https://security-tracker.debian.org/tracker/CVE-2023-2952
https://security-tracker.debian.org/tracker/CVE-2023-3648
https://security-tracker.debian.org/tracker/CVE-2023-3649
https://security-tracker.debian.org/tracker/CVE-2023-4511
https://security-tracker.debian.org/tracker/CVE-2023-4512
https://security-tracker.debian.org/tracker/CVE-2023-4513
https://security-tracker.debian.org/tracker/CVE-2023-6175
https://security-tracker.debian.org/tracker/CVE-2024-0208
https://security-tracker.debian.org/tracker/CVE-2024-0209
https://security-tracker.debian.org/tracker/CVE-2024-0211
https://security-tracker.debian.org/tracker/CVE-2024-2955
https://security-tracker.debian.org/tracker/CVE-2024-4853
https://security-tracker.debian.org/tracker/CVE-2024-4854
https://security-tracker.debian.org/tracker/CVE-2024-8250
Severity: Critical
ID: 207910
File Name: debian_DLA-3906.nasl
Version: 1.2
Type: local
Agent: unix
Family: Debian Local Security Checks
Published: 9/30/2024
Updated: 10/11/2024
Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.9
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2022-0582
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:libwsutil-dev, p-cpe:/a:debian:debian_linux:libwiretap-dev, p-cpe:/a:debian:debian_linux:wireshark, p-cpe:/a:debian:debian_linux:wireshark-doc, p-cpe:/a:debian:debian_linux:libwireshark-dev, p-cpe:/a:debian:debian_linux:wireshark-dev, p-cpe:/a:debian:debian_linux:wireshark-qt, p-cpe:/a:debian:debian_linux:libwireshark-data, p-cpe:/a:debian:debian_linux:tshark, p-cpe:/a:debian:debian_linux:wireshark-common, p-cpe:/a:debian:debian_linux:libwsutil12, p-cpe:/a:debian:debian_linux:libwireshark14, p-cpe:/a:debian:debian_linux:wireshark-gtk, p-cpe:/a:debian:debian_linux:libwiretap11
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/30/2024
Vulnerability Publication Date: 12/29/2021
CVE: CVE-2021-4181, CVE-2021-4182, CVE-2021-4184, CVE-2021-4185, CVE-2021-4186, CVE-2021-4190, CVE-2022-0581, CVE-2022-0582, CVE-2022-0583, CVE-2022-0585, CVE-2022-0586, CVE-2022-3190, CVE-2022-4344, CVE-2022-4345, CVE-2023-0411, CVE-2023-0412, CVE-2023-0413, CVE-2023-0415, CVE-2023-0416, CVE-2023-0417, CVE-2023-0666, CVE-2023-0667, CVE-2023-0668, CVE-2023-1161, CVE-2023-1992, CVE-2023-1993, CVE-2023-1994, CVE-2023-2855, CVE-2023-2856, CVE-2023-2858, CVE-2023-2879, CVE-2023-2906, CVE-2023-2952, CVE-2023-3648, CVE-2023-3649, CVE-2023-4511, CVE-2023-4512, CVE-2023-4513, CVE-2023-6175, CVE-2024-0208, CVE-2024-0209, CVE-2024-0211, CVE-2024-2955, CVE-2024-4853, CVE-2024-4854, CVE-2024-8250, CVE-2024-8645
IAVB: 2021-B-0072-S, 2022-B-0004-S, 2022-B-0006-S, 2022-B-0035-S, 2023-B-0004-S, 2023-B-0008-S, 2023-B-0024-S, 2023-B-0036-S, 2023-B-0051-S, 2023-B-0063-S, 2023-B-0091-S, 2024-B-0001-S, 2024-B-0028-S, 2024-B-0061-S, 2024-B-0126-S