openSUSE Security Update : wireshark (openSUSE-2016-737)

high Nessus Plugin ID 91705

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for wireshark fixes an number of security issues.

Issues in protocol dissectors could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file.

- CVE-2016-5350: The SPOOLS dissector could go into an infinite loop

- CVE-2016-5351: The IEEE 802.11 dissector could crash

- CVE-2016-5353: The UMTS FP dissector could crash

- CVE-2016-5354: Some USB dissectors could crash

- CVE-2016-5355: The Toshiba file parser could crash

- CVE-2016-5356: The CoSine file parser could crash

- CVE-2016-5357: The NetScreen file parser could crash

- CVE-2016-5358: The Ethernet dissector could crash

Solution

Update the affected wireshark packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=983671

Plugin Details

Severity: High

ID: 91705

File Name: openSUSE-2016-737.nasl

Version: 2.5

Type: local

Agent: unix

Published: 6/20/2016

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:wireshark, p-cpe:/a:novell:opensuse:wireshark-debuginfo, p-cpe:/a:novell:opensuse:wireshark-debugsource, p-cpe:/a:novell:opensuse:wireshark-devel, p-cpe:/a:novell:opensuse:wireshark-ui-gtk, p-cpe:/a:novell:opensuse:wireshark-ui-gtk-debuginfo, p-cpe:/a:novell:opensuse:wireshark-ui-qt, p-cpe:/a:novell:opensuse:wireshark-ui-qt-debuginfo, cpe:/o:novell:opensuse:13.2, cpe:/o:novell:opensuse:42.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 6/17/2016

Reference Information

CVE: CVE-2016-5350, CVE-2016-5351, CVE-2016-5353, CVE-2016-5354, CVE-2016-5355, CVE-2016-5356, CVE-2016-5357, CVE-2016-5358