nessus
via4
|
NASL family | Gentoo Local Security Checks | NASL id | GENTOO_GLSA-201110-02.NASL | description | The remote host is affected by the vulnerability described in GLSA-201110-02
(Wireshark: Multiple vulnerabilities)
Multiple vulnerabilities have been discovered in Wireshark. Please
review the CVE identifiers referenced below for details.
Impact :
A remote attacker could send specially crafted packets on a network
being monitored by Wireshark, entice a user to open a malformed packet
trace file using Wireshark, or deploy a specially crafted Lua script for
use by Wireshark, possibly resulting in the execution of arbitrary code,
or a Denial of Service condition.
Workaround :
There is no known workaround at this time. | last seen | 2019-01-16 | modified | 2018-07-11 | plugin id | 56426 | published | 2011-10-10 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=56426 | title | GLSA-201110-02 : Wireshark: Multiple vulnerabilities |
NASL family | SuSE Local Security Checks | NASL id | SUSE_11_WIRESHARK-110331.NASL | description | Wireshark was updated to version 1.4.4 to fix several security issues | last seen | 2018-09-02 | modified | 2018-06-29 | plugin id | 53315 | published | 2011-04-07 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=53315 | title | SuSE 11.1 Security Update : wireshark (SAT Patch Number 4267) |
NASL family | Scientific Linux Local Security Checks | NASL id | SL_20100811_WIRESHARK_ON_SL3_X.NASL | description | Multiple buffer overflow flaws were found in the Wireshark SigComp
Universal Decompressor Virtual Machine (UDVM) dissector. If Wireshark
read a malformed packet off a network or opened a malicious dump file,
it could crash or, possibly, execute arbitrary code as the user
running Wireshark. (CVE-2010-2287, CVE-2010-2995)
Several denial of service flaws were found in Wireshark. Wireshark
could crash or stop responding if it read a malformed packet off a
network, or opened a malicious dump file. (CVE-2010-1455,
CVE-2010-2283, CVE-2010-2284, CVE-2010-2286)
NOTE: This errata updates Wireshark to version 1.0.15 to resolve these
issues.
All running instances of Wireshark must be restarted for the update to
take effect. | last seen | 2019-01-16 | modified | 2019-01-02 | plugin id | 60836 | published | 2012-08-01 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=60836 | title | Scientific Linux Security Update : wireshark on SL3.x, SL4.x, SL5.x i386/x86_64 |
NASL family | SuSE Local Security Checks | NASL id | SUSE_11_2_WIRESHARK-101222.NASL | description | Wireshark version 1.4.2 fixes several security issues that allowed
attackers to crash wireshark or potentially even execute arbitrary
code
(CVE-2010-1455, CVE-2010-2283, CVE-2010-2284, CVE-2010-2285,
CVE-2010-2286, CVE-2010-2287, CVE-2010-2992, CVE-2010-2993,
CVE-2010-2994, CVE-2010-2995, CVE-2010-3445, CVE-2010-4300,
CVE-2010-4301) | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 53808 | published | 2011-05-05 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=53808 | title | openSUSE Security Update : wireshark (openSUSE-SU-2011:0010-2) |
NASL family | CentOS Local Security Checks | NASL id | CENTOS_RHSA-2010-0625.NASL | description | Updated wireshark packages that fix several security issues are now
available for Red Hat Enterprise Linux 3, 4, and 5.
The Red Hat Security Response Team has rated this update as having
moderate security impact. Common Vulnerability Scoring System (CVSS)
base scores, which give detailed severity ratings, are available for
each vulnerability from the CVE links in the References section.
Wireshark is a program for monitoring network traffic. Wireshark was
previously known as Ethereal.
Multiple buffer overflow flaws were found in the Wireshark SigComp
Universal Decompressor Virtual Machine (UDVM) dissector. If Wireshark
read a malformed packet off a network or opened a malicious dump file,
it could crash or, possibly, execute arbitrary code as the user
running Wireshark. (CVE-2010-2287, CVE-2010-2995)
Several denial of service flaws were found in Wireshark. Wireshark
could crash or stop responding if it read a malformed packet off a
network, or opened a malicious dump file. (CVE-2010-1455,
CVE-2010-2283, CVE-2010-2284, CVE-2010-2286)
Users of Wireshark should upgrade to these updated packages, which
contain Wireshark version 1.0.15, and resolve these issues. All
running instances of Wireshark must be restarted for the update to
take effect. | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 48409 | published | 2010-08-24 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=48409 | title | CentOS 4 / 5 : wireshark (CESA-2010:0625) |
NASL family | Fedora Local Security Checks | NASL id | FEDORA_2010-13416.NASL | description | Update to upstream version 1.2.10: *
http://www.wireshark.org/docs/relnotes/wireshark-1.2.9.html *
http://www.wireshark.org/docs/relnotes/wireshark-1.2.10.html fixing
multiple security issues: *
http://www.wireshark.org/security/wnpa-sec-2010-06.html *
http://www.wireshark.org/security/wnpa-sec-2010-08.html
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-11-20 | plugin id | 49092 | published | 2010-09-03 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=49092 | title | Fedora 13 : wireshark-1.2.10-1.fc13 (2010-13416) |
NASL family | Fedora Local Security Checks | NASL id | FEDORA_2010-13427.NASL | description | Update to upstream version 1.2.10: *
http://www.wireshark.org/docs/relnotes/wireshark-1.2.7.html *
http://www.wireshark.org/docs/relnotes/wireshark-1.2.8.html *
http://www.wireshark.org/docs/relnotes/wireshark-1.2.9.html *
http://www.wireshark.org/docs/relnotes/wireshark-1.2.10.html fixing
multiple security issues: *
http://www.wireshark.org/security/wnpa-sec-2010-04.html *
http://www.wireshark.org/security/wnpa-sec-2010-06.html *
http://www.wireshark.org/security/wnpa-sec-2010-08.html
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-11-20 | plugin id | 49093 | published | 2010-09-03 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=49093 | title | Fedora 12 : wireshark-1.2.10-1.fc12 (2010-13427) |
NASL family | Mandriva Local Security Checks | NASL id | MANDRIVA_MDVSA-2010-113.NASL | description | This advisory updates wireshark to the latest version(s), fixing
several security issues :
The SMB dissector in Wireshark 0.99.6 through 1.0.13, and 1.2.0
through 1.2.8 allows remote attackers to cause a denial of service
(NULL pointer dereference) via unknown vectors (CVE-2010-2283).
Buffer overflow in the ASN.1 BER dissector in Wireshark 0.10.13
through 1.0.13 and 1.2.0 through 1.2.8 has unknown impact and remote
attack vectors (CVE-2010-2284).
The SMB PIPE dissector in Wireshark 0.8.20 through 1.0.13 and 1.2.0
through 1.2.8 allows remote attackers to cause a denial of service
(NULL pointer dereference) via unknown vectors (CVE-2010-2285).
The SigComp Universal Decompressor Virtual Machine dissector in
Wireshark 0.10.7 through 1.0.13 and 1.2.0 through 1.2.8 allows remote
attackers to cause a denial of service (infinite loop) via unknown
vectors (CVE-2010-2286).
Buffer overflow in the SigComp Universal Decompressor Virtual Machine
dissector in Wireshark 0.10.8 through 1.0.13 and 1.2.0 through 1.2.8
has unknown impact and remote attack vectors (CVE-2010-2287). | last seen | 2019-01-16 | modified | 2019-01-02 | plugin id | 48186 | published | 2010-07-30 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=48186 | title | Mandriva Linux Security Advisory : wireshark (MDVSA-2010:113) |
NASL family | Windows | NASL id | WIRESHARK_1_2_9.NASL | description | The installed version of Wireshark or Ethereal is potentially
affected by multiple vulnerabilities.
- The SMB dissector can be affected by a NULL pointer
dereference. (Bug 4734)
- The ANS.1 BER dissector can be affected by a buffer
overflow.
- The SMB PIPE dissector can be affected by a NULL pointer
dereference on some platforms.
- The SigComp Universal Decompressor Virtual Machine can
be affected by an infinite loop or a buffer overflow.
(Bug 4826, 4837) | last seen | 2019-01-16 | modified | 2018-08-07 | plugin id | 46864 | published | 2010-06-11 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=46864 | title | Wireshark / Ethereal < 1.0.14 / 1.2.9 Multiple Vulnerabilities |
NASL family | Red Hat Local Security Checks | NASL id | REDHAT-RHSA-2010-0625.NASL | description | Updated wireshark packages that fix several security issues are now
available for Red Hat Enterprise Linux 3, 4, and 5.
The Red Hat Security Response Team has rated this update as having
moderate security impact. Common Vulnerability Scoring System (CVSS)
base scores, which give detailed severity ratings, are available for
each vulnerability from the CVE links in the References section.
Wireshark is a program for monitoring network traffic. Wireshark was
previously known as Ethereal.
Multiple buffer overflow flaws were found in the Wireshark SigComp
Universal Decompressor Virtual Machine (UDVM) dissector. If Wireshark
read a malformed packet off a network or opened a malicious dump file,
it could crash or, possibly, execute arbitrary code as the user
running Wireshark. (CVE-2010-2287, CVE-2010-2995)
Several denial of service flaws were found in Wireshark. Wireshark
could crash or stop responding if it read a malformed packet off a
network, or opened a malicious dump file. (CVE-2010-1455,
CVE-2010-2283, CVE-2010-2284, CVE-2010-2286)
Users of Wireshark should upgrade to these updated packages, which
contain Wireshark version 1.0.15, and resolve these issues. All
running instances of Wireshark must be restarted for the update to
take effect. | last seen | 2019-01-16 | modified | 2018-11-28 | plugin id | 48314 | published | 2010-08-12 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=48314 | title | RHEL 3 / 4 / 5 : wireshark (RHSA-2010:0625) |
NASL family | Oracle Linux Local Security Checks | NASL id | ORACLELINUX_ELSA-2010-0625.NASL | description | From Red Hat Security Advisory 2010:0625 :
Updated wireshark packages that fix several security issues are now
available for Red Hat Enterprise Linux 3, 4, and 5.
The Red Hat Security Response Team has rated this update as having
moderate security impact. Common Vulnerability Scoring System (CVSS)
base scores, which give detailed severity ratings, are available for
each vulnerability from the CVE links in the References section.
Wireshark is a program for monitoring network traffic. Wireshark was
previously known as Ethereal.
Multiple buffer overflow flaws were found in the Wireshark SigComp
Universal Decompressor Virtual Machine (UDVM) dissector. If Wireshark
read a malformed packet off a network or opened a malicious dump file,
it could crash or, possibly, execute arbitrary code as the user
running Wireshark. (CVE-2010-2287, CVE-2010-2995)
Several denial of service flaws were found in Wireshark. Wireshark
could crash or stop responding if it read a malformed packet off a
network, or opened a malicious dump file. (CVE-2010-1455,
CVE-2010-2283, CVE-2010-2284, CVE-2010-2286)
Users of Wireshark should upgrade to these updated packages, which
contain Wireshark version 1.0.15, and resolve these issues. All
running instances of Wireshark must be restarted for the update to
take effect. | last seen | 2019-01-16 | modified | 2018-07-26 | plugin id | 68084 | published | 2013-07-12 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=68084 | title | Oracle Linux 3 / 4 / 5 : wireshark (ELSA-2010-0625) |
NASL family | SuSE Local Security Checks | NASL id | SUSE_11_1_WIRESHARK-101222.NASL | description | Wireshark version 1.4.2 fixes several security issues that allowed
attackers to crash wireshark or potentially even execute arbitrary
code
(CVE-2010-1455, CVE-2010-2283, CVE-2010-2284, CVE-2010-2285,
CVE-2010-2286, CVE-2010-2287, CVE-2010-2992, CVE-2010-2993,
CVE-2010-2994, CVE-2010-2995, CVE-2010-3445, CVE-2010-4300,
CVE-2010-4301) | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 53689 | published | 2011-05-05 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=53689 | title | openSUSE Security Update : wireshark (openSUSE-SU-2011:0010-1) |
NASL family | Debian Local Security Checks | NASL id | DEBIAN_DSA-2066.NASL | description | Several remote vulnerabilities have been discovered in the Wireshark
network traffic analyzer. It was discovered that NULL pointer
dereferences, buffer overflows and infinite loops in the SMB, SMB
PIPE, ASN1.1 and SigComp dissectors could lead to denial of service or
the execution of arbitrary code. | last seen | 2019-01-16 | modified | 2018-11-28 | plugin id | 47584 | published | 2010-07-02 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=47584 | title | Debian DSA-2066-1 : wireshark - several vulnerabilities |
NASL family | SuSE Local Security Checks | NASL id | SUSE_11_3_WIRESHARK-101222.NASL | description | Wireshark version 1.4.2 fixes several security issues that allowed
attackers to crash wireshark or potentially even execute arbitrary
code
(CVE-2010-1455, CVE-2010-2283, CVE-2010-2284, CVE-2010-2285,
CVE-2010-2286, CVE-2010-2287, CVE-2010-2992, CVE-2010-2993,
CVE-2010-2994, CVE-2010-2995, CVE-2010-3445, CVE-2010-4300,
CVE-2010-4301) | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 75771 | published | 2014-06-13 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=75771 | title | openSUSE Security Update : wireshark (openSUSE-SU-2011:0010-2) |
|