Mandriva Linux Security Advisory : wireshark (MDVSA-2011:083)

high Nessus Plugin ID 53882


The remote Mandriva Linux host is missing one or more security updates.


This advisory updates wireshark to the latest version (1.2.16), fixing several security issues :

The X.509if dissector in Wireshark 1.2.x before 1.2.16 and 1.4.x before 1.4.5 does not properly initialize certain global variables, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file (CVE-2011-1590).

Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file (CVE-2011-1591).

The NFS dissector in epan/dissectors/packet-nfs.c in Wireshark 1.4.x before 1.4.5 on Windows uses an incorrect integer data type during decoding of SETCLIENTID calls, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file (CVE-2011-1592).

The updated packages have been upgraded to the latest 1.2.x version (1.2.16) which is not vulnerable to these issues.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 53882

File Name: mandriva_MDVSA-2011-083.nasl

Version: 1.20

Type: local

Published: 5/13/2011

Updated: 1/6/2021

Risk Information


Risk Factor: Critical

Score: 9.5


Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:dumpcap, p-cpe:/a:mandriva:linux:lib64wireshark-devel, p-cpe:/a:mandriva:linux:lib64wireshark0, p-cpe:/a:mandriva:linux:libwireshark-devel, p-cpe:/a:mandriva:linux:libwireshark0, p-cpe:/a:mandriva:linux:rawshark, p-cpe:/a:mandriva:linux:tshark, p-cpe:/a:mandriva:linux:wireshark, p-cpe:/a:mandriva:linux:wireshark-tools, cpe:/o:mandriva:linux:2010.0, cpe:/o:mandriva:linux:2010.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/12/2011

Exploitable With


Core Impact

Metasploit (Wireshark packet-dect.c Stack Buffer Overflow)

Reference Information

CVE: CVE-2011-1590, CVE-2011-1591, CVE-2011-1592

BID: 47392

MDVSA: 2011:083