Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Wireshark Multiple Denial of Service Vulnerabilities-04 August16 (Windows)

Information

Severity

Severity

Medium

Family

Family

Denial of Service

CVSSv2 Base

CVSSv2 Base

4.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:N/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

7 years ago

Modified

Modified

5 years ago

Summary

This host is installed with Wireshark and is prone to multiple denial of service vulnerabilities.

Insight

Insight

The multiple flaws are due to, - The 'epan/dissectors/packet-dcerpc-spoolss.c' script omits in the SPOOLS component mishandles unexpected offsets. - The 'epan/crypt/airpdcap.c' in the IEEE 802.11 dissector mishandles the lack of an EAPOL_RSN_KEY. - The 'epan/dissectors/packet-umts_fp.c' in the UMTS FP dissector mishandles the reserved C/T value. - The 'USB subsystem' mishandles class types. - The 'wiretap/toshiba.c' in the Toshiba file parser mishandles sscanf unsigned-integer processing. - The 'wiretap/cosine.c' in the CoSine file parser mishandles sscanf unsigned-integer processing. - The 'wiretap/netscreen.c' in the NetScreen file parser mishandles sscanf unsigned-integer processing.

Affected Software

Affected Software

Wireshark version 2.0.x before 2.0.4 and 1.12.x before 1.12.12 on Windows.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Wireshark version 2.0.4 or 1.12.12 or later.