TencentOS Server 4: wireshark (TSSA-2024:0345)

high Nessus Plugin ID 239766

Synopsis

The remote TencentOS Server 4 host is missing one or more security updates.

Description

The version of Tencent Linux installed on the remote TencentOS Server 4 host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the TSSA-2024:0345 advisory.

Package updates are available for TencentOS Server 4 that fix the following vulnerabilities:

CVE-2023-0666:
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.

CVE-2023-0668:
Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.

CVE-2023-2854:
BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file

CVE-2023-2855:
Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file

CVE-2023-2856:
VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file

CVE-2023-2857:
BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file

CVE-2023-2858:
NetScaler file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file

CVE-2023-2879:
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file

CVE-2023-2906:
Due to a failure in validating the length provided by an attacker-crafted CP2179 packet, Wireshark versions 2.0.0 through 4.0.7 is susceptible to a divide by zero allowing for a denial of service attack.

CVE-2023-2952:
XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file

CVE-2023-3648:
Kafka dissector crash in Wireshark 4.0.0 to 4.0.6 and 3.6.0 to 3.6.14 allows denial of service via packet injection or crafted capture file

CVE-2023-3649:
iSCSI dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file

CVE-2023-4511:
BT SDP dissector infinite loop in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file

CVE-2023-4512:
CBOR dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file

CVE-2023-4513:
BT SDP dissector memory leak in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file

CVE-2023-5371:
RTPS dissector memory leak in Wireshark 4.0.0 to 4.0.8 and 3.6.0 to 3.6.16 allows denial of service via packet injection or crafted capture file

CVE-2023-0667:
Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark

Tenable has extracted the preceding description block directly from the Tencent Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://mirrors.tencent.com/tlinux/errata/tssa-20240345.xml

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0666

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0668

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2854

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2855

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2856

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2857

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2858

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2879

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2906

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2952

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3648

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3649

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4511

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4512

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4513

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5371

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0667

Plugin Details

Severity: High

ID: 239766

File Name: tencentos_TSSA_2024_0345.nasl

Version: 1.1

Type: local

Published: 6/16/2025

Updated: 6/16/2025

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:tencent:tencentos_server:wireshark, cpe:/o:tencent:tencentos_server:4

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/etc/os-release, Host/TencentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 1/22/2025

Vulnerability Publication Date: 1/22/2025