GLSA-200608-26 : Wireshark: Multiple vulnerabilities

Medium Nessus Plugin ID 22288


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-200608-26 (Wireshark: Multiple vulnerabilities)

The following vulnerabilities have been discovered in Wireshark.
Firstly, if the IPsec ESP parser is used it is susceptible to off-by-one errors, this parser is disabled by default; secondly, the SCSI dissector is vulnerable to an unspecified crash; and finally, the Q.2931 dissector of the SSCOP payload may use all the available memory if a port range is configured. By default, no port ranges are configured.
Impact :

An attacker might be able to exploit these vulnerabilities, resulting in a crash or the execution of arbitrary code with the permissions of the user running Wireshark, possibly the root user.
Workaround :

Disable the SCSI and Q.2931 dissectors with the 'Analyse' and 'Enabled protocols' menus. Make sure the ESP decryption is disabled, with the 'Edit -> Preferences -> Protocols -> ESP' menu.


All Wireshark users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-analyzer/wireshark-0.99.3'

See Also

Plugin Details

Severity: Medium

ID: 22288

File Name: gentoo_GLSA-200608-26.nasl

Version: 1.14

Type: local

Published: 2006/08/30

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5.4

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:wireshark, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 2006/08/29

Reference Information

CVE: CVE-2006-4330, CVE-2006-4331, CVE-2006-4332, CVE-2006-4333

GLSA: 200608-26

CWE: 399