New! Vulnerability Priority Rating (VPR)
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 4.4
SynopsisThe remote Windows host contains an application that is affected by multiple vulnerabilities.
DescriptionThe installed version of Wireshark 1.8 is earlier than 1.8.8. It is, therefore, affected by the following vulnerabilities :
- Errors exist in the CAPWAP, DCP ETSI, GSM CBCH, GMR-1 BCCH, PPP, NBAP, RDP dissectors that could allow them to crash. (Bugs 7664, 7880, 8697, 8717, 8725, 8726, 8727, 8729, 8730)
- An error exists in the Assa Abloy R3 dissector that could cause a denial of service, resulting in consumption of excessive memory and CPU. (Bug 8764)
- An error exists in the HTTP dissector that could overrun the stack, which could result in an application crash.
- An error exists in the Ixia IxVeriWave file parser that could overflow the heap, resulting in consumption of excessive CPU resources and crash. (Bug 8760)
SolutionUpgrade to Wireshark version 1.8.8 or later.