Amazon Linux 2022 : wireshark-cli, wireshark-devel (ALAS2022-2022-079)

critical Nessus Plugin ID 164754

Synopsis

The remote Amazon Linux 2022 host is missing a security update.

Description

It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2022-2022-079 advisory.

A NULL pointer exception flaw was found in Wireshark. A process failure on crafted or malformed input in the IPPUSB dissector can cause a denial of service via a packet injection or a crafted capture file.
(CVE-2021-39920)

A NULL pointer exception flaw was found in Wireshark. A process failure on crafted or malformed input in the Modbus dissector can cause a denial of service via a packet injection or crafted capture file.
(CVE-2021-39921)

A flaw was found in Wireshark. A process failure on crafted or malformed ANSI C12.22 input can cause a denial of service via packet injection or a crafted capture file. (CVE-2021-39922)

A flaw was found in Wireshark. A process failure consumes excessive CPU resources on crafted or malformed PNRP input and can cause a denial of service. (CVE-2021-39923)

A flaw was found in Wireshark. A process failure on crafted or malformed Bluetooth DHT input can cause a denial of service via packet injection or a crafted capture file. (CVE-2021-39924)

A flaw was found in Wireshark. A process failure on crafted or malformed Bluetooth SDP input can cause a denial of service via packet injection or a crafted capture file. (CVE-2021-39925)

A flaw was found in Wireshark. A process failure on crafted or malformed HCI_ISO input can cause a denial of service via packet injection or a crafted capture file. (CVE-2021-39926)

A flaw was found in Wireshark. A process failure on crafted or malformed IEEE 802.11 input can cause a denial of service via packet injection or a crafted capture file. (CVE-2021-39928)

A flaw was found in Wireshark. A process failure on crafted or malformed Bluetooth DHT input can cause a denial of service. (CVE-2021-39929)

A denial of service via packet injection flaw was found in wireshark. An attacker with local network access could pass specially crafted capture files causing an application to halt or crash, leading to a denial of service. (CVE-2021-4181)

A parser infinite-loop flaw was found in wireshark. An attacker with local network access could pass specially crafted capture files causing an application to halt, crash, or infinite loop. (CVE-2021-4182)

An infinite-loop flaw was found in Wireshark's DHT dissector module. This flaw allows an attacker with local network access to pass specially crafted capture files, causing an application to halt, crash or go into an infinite loop. (CVE-2021-4184)

An infinite-loop flaw was found in Wireshark RTMPT. This flaw allows an attacker with local network access to pass specially crafted capture files, causing an application to halt, crash, or go into an infinite loop. (CVE-2021-4185)

A segmentation issue was found in Wireshark. This flaw allows an attacker with local network access to pass specially crafted capture files, causing an application to halt or crash. (CVE-2021-4186)

An infinite-loop flaw was found in Wireshark. This flaw allows an attacker with local network access to pass specially crafted capture files, causing an application to halt, crash, or go into an infinite loop.
(CVE-2021-4190)

Crash in the CMS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file (CVE-2022-0581)

Unaligned access in the CSN.1 protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file (CVE-2022-0582)

Crash in the PVFS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file (CVE-2022-0583)

Large loops in multiple protocol dissectors in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allow denial of service via packet injection or crafted capture file (CVE-2022-0585)

Infinite loop in RTMPT protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file (CVE-2022-0586)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'dnf update --releasever=2022.0.20220518 wireshark' to update your system.

See Also

https://alas.aws.amazon.com/AL2022/ALAS-2022-079.html

https://alas.aws.amazon.com/cve/html/CVE-2021-39920.html

https://alas.aws.amazon.com/cve/html/CVE-2021-39921.html

https://alas.aws.amazon.com/cve/html/CVE-2021-39922.html

https://alas.aws.amazon.com/cve/html/CVE-2021-39923.html

https://alas.aws.amazon.com/cve/html/CVE-2021-39924.html

https://alas.aws.amazon.com/cve/html/CVE-2021-39925.html

https://alas.aws.amazon.com/cve/html/CVE-2021-39926.html

https://alas.aws.amazon.com/cve/html/CVE-2021-39928.html

https://alas.aws.amazon.com/cve/html/CVE-2021-39929.html

https://alas.aws.amazon.com/cve/html/CVE-2021-4181.html

https://alas.aws.amazon.com/cve/html/CVE-2021-4182.html

https://alas.aws.amazon.com/cve/html/CVE-2021-4184.html

https://alas.aws.amazon.com/cve/html/CVE-2021-4185.html

https://alas.aws.amazon.com/cve/html/CVE-2021-4186.html

https://alas.aws.amazon.com/cve/html/CVE-2021-4190.html

https://alas.aws.amazon.com/cve/html/CVE-2022-0581.html

https://alas.aws.amazon.com/cve/html/CVE-2022-0582.html

https://alas.aws.amazon.com/cve/html/CVE-2022-0583.html

https://alas.aws.amazon.com/cve/html/CVE-2022-0585.html

https://alas.aws.amazon.com/cve/html/CVE-2022-0586.html

Plugin Details

Severity: Critical

ID: 164754

File Name: al2022_ALAS2022-2022-079.nasl

Version: 1.6

Type: local

Agent: unix

Published: 9/6/2022

Updated: 12/11/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2022-0582

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:wireshark-cli, p-cpe:/a:amazon:linux:wireshark-devel, cpe:/o:amazon:linux:2022, p-cpe:/a:amazon:linux:wireshark-cli-debuginfo, p-cpe:/a:amazon:linux:wireshark-debugsource

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/18/2022

Vulnerability Publication Date: 11/17/2021

Reference Information

CVE: CVE-2021-39920, CVE-2021-39921, CVE-2021-39922, CVE-2021-39923, CVE-2021-39924, CVE-2021-39925, CVE-2021-39926, CVE-2021-39928, CVE-2021-39929, CVE-2021-4181, CVE-2021-4182, CVE-2021-4184, CVE-2021-4185, CVE-2021-4186, CVE-2021-4190, CVE-2022-0581, CVE-2022-0582, CVE-2022-0583, CVE-2022-0585, CVE-2022-0586

IAVB: 2022-B-0035-S