Synopsis
An application installed on the remote macOS / Mac OS X host is affected by multiple vulnerabilities.
Description
The version of Wireshark installed on the remote macOS / Mac OS X host is prior to 3.2.2. It is, therefore, affected by multiple vulnerabilities as referenced in the wireshark-3.2.2 advisory.
- The LTE RRC dissector could leak memory. It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. (wireshark-bug-16341)
- The WiMax DLMAP dissector could crash. It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. (wireshark- bug-16368)
- The EAP dissector could crash. It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. (wireshark-bug-16397)
- The WireGuard dissector could crash. It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. (wireshark-bug-16394)
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Upgrade to Wireshark version 3.2.2 or later.
Plugin Details
File Name: macosx_wireshark_3_2_2.nasl
Agent: macosx
Supported Sensors: Nessus Agent, Nessus
Vulnerability Information
CPE: cpe:/a:wireshark:wireshark
Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, installed_sw/Wireshark
Patch Publication Date: 2/26/2020
Vulnerability Publication Date: 2/26/2020