Wireshark 2.0.x < 2.0.6 Multiple Vulnerabilities (macOS)

medium Nessus Plugin ID 93517

Synopsis

An application installed on the remote macOS / Mac OS X host is affected by multiple vulnerabilities.

Description

The version of Wireshark installed on the remote macOS / Mac OS X host is prior to 2.0.6. It is, therefore, affected by multiple vulnerabilities as referenced in the wireshark-2.0.6 advisory.

- epan/dissectors/packet-ipmi-trace.c in the IPMI trace dissector in Wireshark 2.x before 2.0.6 does not properly consider whether a string is constant, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet. (CVE-2016-7180)

- epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark 2.x before 2.0.6 mishandles MAC address data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet. (CVE-2016-7175)

- epan/dissectors/packet-h225.c in the H.225 dissector in Wireshark 2.x before 2.0.6 calls snprintf with one of its input buffers as the output buffer, which allows remote attackers to cause a denial of service (copy overlap and application crash) via a crafted packet. (CVE-2016-7176)

- epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark 2.x before 2.0.6 does not restrict the number of channels, which allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet. (CVE-2016-7177)

- epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 2.x before 2.0.6 does not ensure that memory is allocated for certain data structures, which allows remote attackers to cause a denial of service (invalid write access and application crash) via a crafted packet. (CVE-2016-7178)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Wireshark version 2.0.6 or later.

See Also

https://gitlab.com/wireshark/wireshark/-/issues/11850

https://gitlab.com/wireshark/wireshark/-/issues/12700

https://gitlab.com/wireshark/wireshark/-/issues/12750

https://gitlab.com/wireshark/wireshark/-/issues/12751

https://gitlab.com/wireshark/wireshark/-/issues/12752

https://gitlab.com/wireshark/wireshark/-/issues/12782

https://www.wireshark.org/security/wnpa-sec-2016-51

https://www.wireshark.org/security/wnpa-sec-2016-52

https://www.wireshark.org/security/wnpa-sec-2016-53

https://www.wireshark.org/security/wnpa-sec-2016-54

https://www.wireshark.org/security/wnpa-sec-2016-55

https://www.wireshark.org/docs/relnotes/wireshark-2.0.6.html

https://www.wireshark.org/security/wnpa-sec-2016-50

Plugin Details

Severity: Medium

ID: 93517

File Name: macosx_wireshark_2_0_6.nasl

Version: 1.10

Type: Local

Agent: macosx

Published: 9/15/2016

Updated: 5/1/2026

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2016-7180

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:wireshark:wireshark

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, installed_sw/Wireshark

Exploit Ease: No known exploits are available

Patch Publication Date: 9/8/2016

Vulnerability Publication Date: 12/4/2015

Reference Information

CVE: CVE-2016-7175, CVE-2016-7176, CVE-2016-7177, CVE-2016-7178, CVE-2016-7179, CVE-2016-7180

BID: 92889