SuSE 10 Security Update : wireshark (ZYPP Patch Number 7795)

high Nessus Plugin ID 56617


The remote SuSE 10 host is missing a security-related patch.


This update of wireshark fixes the following vulnerabilities :

- Wireshark IKE dissector vulnerability. (CVE-2011-3266)

- Wireshark Lua script execution vulnerability.

- Wireshark buffer exception handling vulnerability.

- Lucent/Ascend file parser susceptible to infinite loop.

- ANSI MAP dissector susceptible to infinite loop.

- Large/infinite loop in the DICOM dissector.

- A corrupted snoop file could crash Wireshark.

- Malformed compressed capture data could crash Wireshark.

- A corrupted Visual Networks file could crash Wireshark.

- dereferene a NULL pointer if we had a corrupted Diameter dictionary. (CVE-2011-1958)


Apply ZYPP patch number 7795.

See Also

Plugin Details

Severity: High

ID: 56617

File Name: suse_wireshark-7795.nasl

Version: 1.12

Type: local

Agent: unix

Published: 10/24/2011

Updated: 1/19/2021

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: High

Score: 7.4


Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/SuSE/rpm-list, Host/cpu, Host/SuSE/release

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/13/2011

Exploitable With

CANVAS (White_Phosphorus)

Core Impact

Metasploit (Wireshark console.lua Pre-Loading Script Execution)

Reference Information

CVE: CVE-2011-1957, CVE-2011-1958, CVE-2011-1959, CVE-2011-2174, CVE-2011-2175, CVE-2011-2597, CVE-2011-2698, CVE-2011-3266, CVE-2011-3360, CVE-2011-3483