New! Vulnerability Priority Rating (VPR)
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 3.6
SynopsisThe remote Windows host contains an application that is affected by multiple vulnerabilities.
DescriptionThe installed version of Wireshark 1.8 is earlier than 1.8.4. It is, therefore, affected by the following vulnerabilities :
- Errors exist related to the USB, sFlow, EIGRP, 3GPP2 A11, SCTP, ICMPv6, iSCSI, WTP and RTCP dissectors that can allow denial of service attacks by putting the application into an infinite loop. (Bug 7787, 7789, 7800, 7801, 7802, 7844, 7858, 7869, 7889)
- An error exists in the ISAKMP dissector that can allow a malformed packet to crash the application. (Bug 7855)
- An error exists related to pcap-ng host names that can allow disclosure of sensitive information while working with multiple pcap-ng files. (wnpa-2012-30)
SolutionUpgrade to Wireshark version 1.8.4 or later.