Executive Summary
Summary | |
---|---|
Title | wireshark security update |
Informations | |||
---|---|---|---|
Name | DSA-2825 | First vendor Publication | 2013-12-20 |
Vendor | Debian | Last vendor Modification | 2013-12-20 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Laurent Butti and Garming Sam discored multiple vulnerabilities in the dissectors for NTLMSSPv2 and BSSGP, which could lead to denial of service or the execution of arbitrary code. For the stable distribution (wheezy), these problems have been fixed in version 1.8.2-5wheezy9. For the unstable distribution (sid), these problems have been fixed in version 1.10.4-1. We recommend that you upgrade your wireshark packages. |
Original Source
Url : http://www.debian.org/security/2013/dsa-2825 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
50 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:20903 | |||
Oval ID: | oval:org.mitre.oval:def:20903 | ||
Title: | epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | ||
Description: | epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-7113 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP Microsoft Windows 8 Microsoft Windows Server 2012 | Product(s): | Wireshark |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21049 | |||
Oval ID: | oval:org.mitre.oval:def:21049 | ||
Title: | DSA-2825-1 wireshark - several | ||
Description: | Laurent Butti and Garming Sam discovered multiple vulnerabilities in the dissectors for NTLMSSPv2 and BSSGP, which could lead to denial of service or the execution of arbitrary code. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2825-1 CVE-2013-7113 CVE-2013-7114 | Version: | 5 |
Platform(s): | Debian GNU/Linux 7 Debian GNU/kFreeBSD 7 | Product(s): | wireshark |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21227 | |||
Oval ID: | oval:org.mitre.oval:def:21227 | ||
Title: | Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service (application crash) via a long domain name in a packet. | ||
Description: | Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service (application crash) via a long domain name in a packet. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-7114 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP Microsoft Windows 8 Microsoft Windows Server 2012 | Product(s): | Wireshark |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25322 | |||
Oval ID: | oval:org.mitre.oval:def:25322 | ||
Title: | SUSE-SU-2014:0115-1 -- Security update for wireshark | ||
Description: | wireshark was updated to security update version 1.8.12, fixing bugs and security issues. * The SIP dissector could go into an infinite loop. wnpa-sec-2013-66 CVE-2013-7112 * The NTLMSSP v2 dissector could crash. Discovered by Garming Sam. wnpa-sec-2013-68 CVE-2013-7114 Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.8.12.htm l <https://www.wireshark.org/docs/relnotes/wireshark-1.8.12.ht ml> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:0115-1 CVE-2013-7112 CVE-2013-7114 CVE-2013-7113 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | wireshark |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:25461 | |||
Oval ID: | oval:org.mitre.oval:def:25461 | ||
Title: | SUSE-SU-2014:0431-1 -- Security update for wireshark | ||
Description: | This update fixes a security problem in the BSSGP network protocol dissector that could crash wireshark. Security Issue reference: * CVE-2013-7113 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113 > | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:0431-1 CVE-2013-7113 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | wireshark |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_wireshark_20140225.nasl - Type : ACT_GATHER_INFO |
2014-10-12 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-330.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-3.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-9.nasl - Type : ACT_GATHER_INFO |
2014-04-01 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0342.nasl - Type : ACT_GATHER_INFO |
2014-04-01 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0342.nasl - Type : ACT_GATHER_INFO |
2014-04-01 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0342.nasl - Type : ACT_GATHER_INFO |
2014-04-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140331_wireshark_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-03-25 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_wireshark-140305.nasl - Type : ACT_GATHER_INFO |
2014-01-22 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_wireshark-131227.nasl - Type : ACT_GATHER_INFO |
2013-12-23 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2825.nasl - Type : ACT_GATHER_INFO |
2013-12-23 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-296.nasl - Type : ACT_GATHER_INFO |
2013-12-18 | Name : The remote Windows host contains an application that is affected by multiple ... File : wireshark_1_10_4.nasl - Type : ACT_GATHER_INFO |
2013-12-18 | Name : The remote Windows host contains an application that is affected by multiple ... File : wireshark_1_8_12.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:32:25 |
|
2013-12-20 21:23:38 |
|
2013-12-20 17:18:22 |
|