Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Wireshark Multiple Denial-of-Service Vulnerabilities March16 (Windows)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
This host is installed with Wireshark and is prone to multiple denial of service vulnerabilities.
Insight
Insight
Multiple flaws exist due to, - The 'dissect_nhdr_extopt' function in 'epan/dissectors/packet-lbmc.c' script in the LBMC dissector does not validate length values. - The 'wiretap/nettrace_3gpp_32_423.c' script in the 3GPP TS 32.423 Trace file parser does not ensure that a '\0' character is present at the end of certain strings. - The 'epan/dissectors/packet-hiqnet.c' script in the HiQnet dissector does not validate the data type. - The 'epan/dissectors/packet-x509af.c' script in the X.509AF dissector mishandles the algorithm ID. - The 'epan/dissectors/packet-http2.c' script in the HTTP/2 dissector does not limit the amount of header data. - The 'dissect_ber_constrained_bitstring' function in 'epan/dissectors/packet-ber.c' script in the ASN.1 BER dissector does not verify that a certain length is nonzero. - A heap-based buffer overflow error in 'wiretap/vwr.c' script in the Ixia IxVeriWave file parser. - An error in NFS dissector. - 'epan/dissectors/packet-spice.c' script in the SPICE dissector in mishandles capability data. - 'epan/dissectors/packet-ieee80211.c' script in the IEEE 802.11 dissector mishandles the Grouping subfield.
Affected Software
Affected Software
Wireshark version 2.0.x before 2.0.2 on Windows
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Upgrade to Wireshark version 2.0.2 or later.
Common Vulnerabilities and Exposures (CVE)
References
- http://www.wireshark.org/security/wnpa-sec-2016-08.html
- http://www.wireshark.org/security/wnpa-sec-2016-07.html
- http://www.wireshark.org/security/wnpa-sec-2016-06.html
- http://www.wireshark.org/security/wnpa-sec-2016-04.html
- http://www.wireshark.org/security/wnpa-sec-2016-05.html
- http://www.wireshark.org/security/wnpa-sec-2016-02.html
- https://www.wireshark.org/security/wnpa-sec-2016-13.html