ID CVE-2011-1592
Summary The NFS dissector in epan/dissectors/packet-nfs.c in Wireshark 1.4.x before 1.4.5 on Windows uses an incorrect integer data type during decoding of SETCLIENTID calls, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.
References
Vulnerable Configurations
  • Wireshark 1.4.3
    cpe:2.3:a:wireshark:wireshark:1.4.3
  • Wireshark 1.4.2
    cpe:2.3:a:wireshark:wireshark:1.4.2
  • Wireshark 1.4.1
    cpe:2.3:a:wireshark:wireshark:1.4.1
  • Wireshark 1.4.0
    cpe:2.3:a:wireshark:wireshark:1.4.0
  • Wireshark 1.4.4
    cpe:2.3:a:wireshark:wireshark:1.4.4
  • Microsoft Windows
    cpe:2.3:o:microsoft:windows
CVSS
Base: 4.3 (as of 02-05-2011 - 11:25)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id SUSE_WIRESHARK-7500.NASL
    description This update to wireshark version 1.4.5 fixes the following security issues : - Resource Management Errors. (CWE-399, CVE-2011-1590) - Buffer Errors. (CWE-119, CVE-2011-1591) - Numeric Errors (CWE-189, CVE-2011-1592)
    last seen 2019-02-21
    modified 2017-06-05
    plugin id 57262
    published 2011-12-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57262
    title SuSE 10 Security Update : wireshark (ZYPP Patch Number 7500)
  • NASL family Windows
    NASL id WIRESHARK_1_4_5.NASL
    description The installed version of Wireshark is 1.2.x less than 1.2.16 or 1.4.x less than 1.4.5. Such versions are affected by the following vulnerabilities : - A data type mismatch error exists in the function 'dissect_nfs_clientaddr4' in the file 'packet-nfs.c' of the NFS dissector and could lead to application crashes while decoding 'SETCLIENTID' calls. (5209) - A use-after-free error exists in the file 'asn1/x509if/x509if.cnf' of the X.509if dissector that could lead to application crashes. (5754, 5793) - An buffer overflow vulnerability exists in the file 'packet-dect.c' of the DECT dissector that could allow arbitrary code execution. (5836)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 53473
    published 2011-04-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53473
    title Wireshark < 1.2.16 / 1.4.5 Multiple Vulnerabilities
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_WIRESHARK-110503.NASL
    description This update to wireshark version 1.4.5 fixes the following security issues : - Resource Management Errors. (CWE-399, CVE-2011-1590) - Buffer Errors. (CWE-119, CVE-2011-1591) - Numeric Errors (CWE-189, CVE-2011-1592)
    last seen 2019-02-21
    modified 2017-06-05
    plugin id 54994
    published 2011-06-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=54994
    title SuSE 11.1 Security Update : wireshark (SAT Patch Number 4476)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201110-02.NASL
    description The remote host is affected by the vulnerability described in GLSA-201110-02 (Wireshark: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Wireshark. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could send specially crafted packets on a network being monitored by Wireshark, entice a user to open a malformed packet trace file using Wireshark, or deploy a specially crafted Lua script for use by Wireshark, possibly resulting in the execution of arbitrary code, or a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 56426
    published 2011-10-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=56426
    title GLSA-201110-02 : Wireshark: Multiple vulnerabilities
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2011-083.NASL
    description This advisory updates wireshark to the latest version (1.2.16), fixing several security issues : The X.509if dissector in Wireshark 1.2.x before 1.2.16 and 1.4.x before 1.4.5 does not properly initialize certain global variables, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file (CVE-2011-1590). Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file (CVE-2011-1591). The NFS dissector in epan/dissectors/packet-nfs.c in Wireshark 1.4.x before 1.4.5 on Windows uses an incorrect integer data type during decoding of SETCLIENTID calls, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file (CVE-2011-1592). The updated packages have been upgraded to the latest 1.2.x version (1.2.16) which is not vulnerable to these issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 53882
    published 2011-05-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53882
    title Mandriva Linux Security Advisory : wireshark (MDVSA-2011:083)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_WIRESHARK-7501.NASL
    description This update to wireshark version 1.4.5 fixes the following security issues : - Resource Management Errors. (CWE-399, CVE-2011-1590) - Buffer Errors. (CWE-119, CVE-2011-1591) - Numeric Errors (CWE-189, CVE-2011-1592)
    last seen 2019-02-21
    modified 2017-06-05
    plugin id 54995
    published 2011-06-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=54995
    title SuSE 10 Security Update : wireshark (ZYPP Patch Number 7501)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_3_WIRESHARK-110511.NASL
    description This wireshark update fixes : - Use of un-initialized variables (CVE-2011-1590) - Buffer overflow in DECT dissector (CVE-2011-1591) - Crash in NFS dissector on Windows (CVE-2011-1592)
    last seen 2018-11-13
    modified 2018-11-10
    plugin id 75773
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75773
    title openSUSE Security Update : wireshark (openSUSE-SU-2011:0602-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_4_WIRESHARK-110511.NASL
    description This wireshark update fixes : - Use of un-initialized variables (CVE-2011-1590) - Buffer overflow in DECT dissector (CVE-2011-1591) - Crash in NFS dissector on Windows (CVE-2011-1592)
    last seen 2018-11-13
    modified 2018-11-10
    plugin id 76044
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=76044
    title openSUSE Security Update : wireshark (openSUSE-SU-2011:0599-1)
oval via4
accepted 2013-08-19T04:00:48.205-04:00
class vulnerability
contributors
  • name Shane Shaffer
    organization G2, Inc.
  • name Shane Shaffer
    organization G2, Inc.
  • name Shane Shaffer
    organization G2, Inc.
definition_extensions
comment Wireshark is installed on the system.
oval oval:org.mitre.oval:def:6589
description The NFS dissector in epan/dissectors/packet-nfs.c in Wireshark 1.4.x before 1.4.5 on Windows uses an incorrect integer data type during decoding of SETCLIENTID calls, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.
family windows
id oval:org.mitre.oval:def:14987
status accepted
submitted 2012-02-27T15:34:33.178-04:00
title NFS dissector in epan/dissectors/packet-nfs.c vulnerability in Wireshark 1.4.x before 1.4.5 on Windows
version 8
refmap via4
confirm
mandriva MDVSA-2011:083
mlist
  • [oss-security] 20110418 Re: Wireshark 1.2.16 / 1.4.5
  • [oss-security] 20110418 Wireshark 1.2.16 / 1.4.5
osvdb 71847
secunia 44172
vupen ADV-2011-1022
xf wireshark-nfs-dos(66833)
Last major update 13-08-2012 - 23:26
Published 29-04-2011 - 18:55
Last modified 18-09-2017 - 21:32
Back to Top