RHEL 4 / 5 : wireshark (RHSA-2008:0058)

Critical Nessus Plugin ID 30034

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated wireshark packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

Wireshark is a program for monitoring network traffic. Wireshark was previously known as Ethereal.

Several flaws were found in Wireshark. Wireshark could crash or possibly execute arbitrary code as the user running Wireshark if it read a malformed packet off the network. (CVE-2007-6112, CVE-2007-6114, CVE-2007-6115, CVE-2007-6117)

Several denial of service bugs were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off the network. (CVE-2007-6111, CVE-2007-6113, CVE-2007-6116, CVE-2007-6118, CVE-2007-6119, CVE-2007-6120, CVE-2007-6121, CVE-2007-6438, CVE-2007-6439, CVE-2007-6441, CVE-2007-6450, CVE-2007-6451)

As well, Wireshark switched from using net-snmp to libsmi, which is included in this errata.

Users of wireshark should upgrade to these updated packages, which contain Wireshark version 0.99.7, and resolve these issues.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/cve/cve-2007-6111

https://access.redhat.com/security/cve/cve-2007-6112

https://access.redhat.com/security/cve/cve-2007-6113

https://access.redhat.com/security/cve/cve-2007-6114

https://access.redhat.com/security/cve/cve-2007-6115

https://access.redhat.com/security/cve/cve-2007-6116

https://access.redhat.com/security/cve/cve-2007-6117

https://access.redhat.com/security/cve/cve-2007-6118

https://access.redhat.com/security/cve/cve-2007-6119

https://access.redhat.com/security/cve/cve-2007-6120

https://access.redhat.com/security/cve/cve-2007-6121

https://access.redhat.com/security/cve/cve-2007-6438

https://access.redhat.com/security/cve/cve-2007-6439

https://access.redhat.com/security/cve/cve-2007-6441

https://access.redhat.com/security/cve/cve-2007-6450

https://access.redhat.com/security/cve/cve-2007-6451

https://www.wireshark.org/docs/relnotes/wireshark-0.99.7.html

https://access.redhat.com/errata/RHSA-2008:0058

Plugin Details

Severity: Critical

ID: 30034

File Name: redhat-RHSA-2008-0058.nasl

Version: 1.22

Type: local

Agent: unix

Published: 2008/01/21

Updated: 2018/11/27

Dependencies: 12634

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:libsmi, p-cpe:/a:redhat:enterprise_linux:libsmi-devel, p-cpe:/a:redhat:enterprise_linux:wireshark, p-cpe:/a:redhat:enterprise_linux:wireshark-gnome, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:4.6, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:5.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2008/01/21

Reference Information

CVE: CVE-2007-6111, CVE-2007-6112, CVE-2007-6113, CVE-2007-6114, CVE-2007-6115, CVE-2007-6116, CVE-2007-6117, CVE-2007-6118, CVE-2007-6119, CVE-2007-6120, CVE-2007-6121, CVE-2007-6438, CVE-2007-6439, CVE-2007-6441, CVE-2007-6450, CVE-2007-6451

BID: 26532, 27071

RHSA: 2008:0058

CWE: 20, 119, 189, 264, 399