Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Wireshark Multiple Vulnerabilities-01 Dec 2012 (Mac OS X)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
This host is installed with Wireshark and is prone to multiple vulnerabilities.
Insight
Insight
The flaws are due to - A division by zero error within the DCP ETSI dissector, an error within the STUN dissector and EtherCAT Mailbox dissector can be exploited to cause a crash. - An error within the RTPS2 dissector can be exploited to cause a buffer overflow. - An error within the STUN dissector can be exploited to cause a crash. - An error within the CIP dissector can be exploited to exhaust memory. - An error within the CTDB dissector, AFP dissector and XTP dissector can be exploited to trigger an infinite loop and consume excessive CPU resources.
Affected Software
Affected Software
Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10 and 1.8.x before 1.8.2 on Mac OS X
Solution
Solution
Upgrade to the Wireshark version 1.4.15, 1.6.10 or 1.8.2 or later.
Common Vulnerabilities and Exposures (CVE)
References
- http://secunia.com/advisories/50276/
- http://securitytracker.com/id/1027404
- http://www.wireshark.org/security/wnpa-sec-2012-13.html
- http://www.wireshark.org/security/wnpa-sec-2012-20.html
- http://www.wireshark.org/security/wnpa-sec-2012-23.html
- http://www.wireshark.org/security/wnpa-sec-2012-17.html
- http://www.wireshark.org/security/wnpa-sec-2012-15.html
- http://www.wireshark.org/download