openSUSE Security Update : wireshark (openSUSE-SU-2011:1142-1)

high Nessus Plugin ID 76045

Synopsis

The remote openSUSE host is missing a security update.

Description

This update of wireshark fixes the following vulnerabilities :

- CVE-2011-3266: Wireshark IKE dissector vulnerability

- CVE-2011-3360: Wireshark Lua script execution vulnerability

- CVE-2011-3483: Wireshark buffer exception handling vulnerability

- CVE-2011-2597: Lucent/Ascend file parser susceptible to infinite loop

- CVE-2011-2698: ANSI MAP dissector susceptible to infinite loop

- CVE-2011-1957: Large/infinite loop in the DICOM dissector

- CVE-2011-1959: A corrupted snoop file could crash Wireshark

- CVE-2011-2174: Malformed compressed capture data could crash Wireshark

- CVE-2011-2175: A corrupted Visual Networks file could crash Wireshark

- CVE-2011-1958: dereferene a NULL pointer if we had a corrupted Diameter dictionary

Solution

Update the affected wireshark packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=697516

https://bugzilla.novell.com/show_bug.cgi?id=706728

https://bugzilla.novell.com/show_bug.cgi?id=718032

https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html

Plugin Details

Severity: High

ID: 76045

File Name: suse_11_4_wireshark-111013.nasl

Version: 1.6

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:novell:opensuse:11.4, p-cpe:/a:novell:opensuse:wireshark-debuginfo, p-cpe:/a:novell:opensuse:wireshark-devel, p-cpe:/a:novell:opensuse:wireshark, p-cpe:/a:novell:opensuse:wireshark-debugsource

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/13/2011

Exploitable With

CANVAS (White_Phosphorus)

Core Impact

Metasploit (Wireshark console.lua Pre-Loading Script Execution)

Reference Information

CVE: CVE-2011-1957, CVE-2011-1958, CVE-2011-1959, CVE-2011-2174, CVE-2011-2175, CVE-2011-2597, CVE-2011-2698, CVE-2011-3266, CVE-2011-3360, CVE-2011-3483