Mandriva Linux Security Advisory : wireshark (MDVSA-2011:083)

high Nessus Plugin ID 53882

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

This advisory updates wireshark to the latest version (1.2.16), fixing several security issues :

The X.509if dissector in Wireshark 1.2.x before 1.2.16 and 1.4.x before 1.4.5 does not properly initialize certain global variables, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file (CVE-2011-1590).

Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file (CVE-2011-1591).

The NFS dissector in epan/dissectors/packet-nfs.c in Wireshark 1.4.x before 1.4.5 on Windows uses an incorrect integer data type during decoding of SETCLIENTID calls, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file (CVE-2011-1592).

The updated packages have been upgraded to the latest 1.2.x version (1.2.16) which is not vulnerable to these issues.

Solution

Update the affected packages.

See Also

http://www.wireshark.org/docs/relnotes/wireshark-1.2.16.html

Plugin Details

Severity: High

ID: 53882

File Name: mandriva_MDVSA-2011-083.nasl

Version: 1.20

Type: local

Published: 5/13/2011

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.5

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:dumpcap, p-cpe:/a:mandriva:linux:lib64wireshark-devel, p-cpe:/a:mandriva:linux:lib64wireshark0, p-cpe:/a:mandriva:linux:libwireshark-devel, p-cpe:/a:mandriva:linux:libwireshark0, p-cpe:/a:mandriva:linux:rawshark, p-cpe:/a:mandriva:linux:tshark, p-cpe:/a:mandriva:linux:wireshark, p-cpe:/a:mandriva:linux:wireshark-tools, cpe:/o:mandriva:linux:2010.0, cpe:/o:mandriva:linux:2010.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/12/2011

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Wireshark packet-dect.c Stack Buffer Overflow)

Reference Information

CVE: CVE-2011-1590, CVE-2011-1591, CVE-2011-1592

BID: 47392

MDVSA: 2011:083