Executive Summary

Informations
Name MDVSA-2011:138 First vendor Publication 2011-09-28
Vendor Mandriva Last vendor Modification 2011-09-28
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

This advisory updates wireshark to the latest version (1.6.2), fixing several security issues:

Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2 allows local users to gain privileges via a Trojan horse Lua script in an unspecified directory (CVE-2011-3360).

The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.2 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (application crash) via a malformed packet (CVE-2011-3482).

Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (application crash) via a malformed capture file that leads to an invalid root tvbuff, related to a buffer exception handling vulnerability. (CVE-2011-3483).

The unxorFrame function in epan/dissectors/packet-opensafety.c in the OpenSafety dissector in Wireshark 1.6.x before 1.6.2 does not properly validate a certain frame size, which allows remote attackers to cause a denial of service (loop and application crash) via a malformed packet (CVE-2011-3484).

The updated packages have been upgraded to the latest 1.6.x version (1.6.2) which is not vulnerable to these issues.

Original Source

Url : http://www.mandriva.com/security/advisories?name=MDVSA-2011:138

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-399 Resource Management Errors
25 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
25 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:14837
 
Oval ID: oval:org.mitre.oval:def:14837
Title: DSA-2324-1 wireshark -- programming error
Description: The Microsoft Vulnerability Research group discovered that insecure load path handling could lead to execution of arbitrary Lua script code.
Family: unix Class: patch
Reference(s): DSA-2324-1
CVE-2011-3360
Version: 5
Platform(s): Debian GNU/Linux 5.0
Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): wireshark
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:14886
 
Oval ID: oval:org.mitre.oval:def:14886
Title: CSN.1 dissector in Wireshark 1.6.x before 1.6.2 denial of service vulnerability
Description: The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.2 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
Family: windows Class: vulnerability
Reference(s): CVE-2011-3482
Version: 6
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Wireshark
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:14971
 
Oval ID: oval:org.mitre.oval:def:14971
Title: Wireshark 1.6.x before 1.6.2 buffer exception handling vulnerability
Description: Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (application crash) via a malformed capture file that leads to an invalid root tvbuff, related to a "buffer exception handling vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2011-3483
Version: 6
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Wireshark
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15042
 
Oval ID: oval:org.mitre.oval:def:15042
Title: proto_tree_add_item function vulnerability in Wireshark 1.4.x through 1.4.8 and 1.6.0 through 1.6.1
Description: The proto_tree_add_item function in Wireshark 1.6.0 through 1.6.1 and 1.4.0 through 1.4.8, when the IKEv1 protocol dissector is used, allows user-assisted remote attackers to cause a denial of service (infinite loop) via vectors involving a malformed IKE packet and many items in a tree.
Family: windows Class: vulnerability
Reference(s): CVE-2011-3266
Version: 6
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Wireshark
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15059
 
Oval ID: oval:org.mitre.oval:def:15059
Title: Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2
Description: Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2 allows local users to gain privileges via a Trojan horse Lua script in an unspecified directory.
Family: windows Class: vulnerability
Reference(s): CVE-2011-3360
Version: 6
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Wireshark
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15062
 
Oval ID: oval:org.mitre.oval:def:15062
Title: OpenSafety dissector in Wireshark 1.6.x before 1.6.2 denial of service vulnerability
Description: The unxorFrame function in epan/dissectors/packet-opensafety.c in the OpenSafety dissector in Wireshark 1.6.x before 1.6.2 does not properly validate a certain frame size, which allows remote attackers to cause a denial of service (loop and application crash) via a malformed packet.
Family: windows Class: vulnerability
Reference(s): CVE-2011-3484
Version: 6
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Wireshark
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 11

SAINT Exploits

Description Link
Wireshark Lua Untrusted Search Path vulnerability More info here

OpenVAS Exploits

Date Description
2012-05-02 Name : Wireshark Code Execution and Denial of Service Vulnerabilities (Mac OS X)
File : nvt/gb_wireshark_code_exec_n_dos_vuln_macosx.nasl
2012-05-02 Name : Wireshark Multiple Denial of Service Vulnerabilities (Mac OS X)
File : nvt/gb_wireshark_mult_dos_vuln_macosx_oct11.nasl
2012-04-02 Name : Fedora Update for wireshark FEDORA-2011-12399
File : nvt/gb_fedora_2011_12399_wireshark_fc16.nasl
2012-02-12 Name : Gentoo Security Advisory GLSA 201110-02 (wireshark)
File : nvt/glsa_201110_02.nasl
2012-02-11 Name : Debian Security Advisory DSA 2324-1 (wireshark)
File : nvt/deb_2324_1.nasl
2012-02-11 Name : Debian Security Advisory DSA 2395-1 (wireshark)
File : nvt/deb_2395_1.nasl
2011-10-04 Name : Wireshark Lua Script File Arbitrary Code Execution Vulnerability (Windows)
File : nvt/gb_wireshark_lua_script_code_exec_vuln_win.nasl
2011-10-04 Name : Wireshark Multiple Denial of Service Vulnerabilities (Windows)
File : nvt/gb_wireshark_mult_dos_vuln_win_oct11.nasl
2011-09-23 Name : Fedora Update for wireshark FEDORA-2011-12423
File : nvt/gb_fedora_2011_12423_wireshark_fc14.nasl
2011-09-20 Name : Fedora Update for wireshark FEDORA-2011-12403
File : nvt/gb_fedora_2011_12403_wireshark_fc15.nasl
2011-08-26 Name : Wireshark IKE Packet Denial of Service Vulnerability (Win)
File : nvt/secpod_wireshark_ike_packet_dos_vuln_win.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
75586 Wireshark OpenSafety Dissector epan/dissectors/packet-opensafety.c unxorFrame...

75348 Wireshark CSN.1 Dissector Packet Handling Remote DoS

75347 Wireshark DLL Hijacking Path Subversion Local Privilege Escalation

75346 Wireshark Packet Trace File Handling Remote DoS

74732 Wireshark IKEv1 Protocol Dissector proto_tree_add_item Function Infinite Loop...

Snort® IPS/IDS

Date Description
2014-01-10 Wireshark console.lua file load exploit attempt
RuleID : 23239 - Revision : 9 - Type : SERVER-OTHER
2014-01-10 Wireshark console.lua file load exploit attempt
RuleID : 23238 - Revision : 10 - Type : NETBIOS

Nessus® Vulnerability Scanner

Date Description
2015-01-19 Name : The remote Solaris system is missing a security patch for third-party software.
File : solaris11_wireshark_20111205.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_4_wireshark-111115.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_4_wireshark-111013.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_wireshark-111115.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_wireshark-111013.nasl - Type : ACT_GATHER_INFO
2012-09-06 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2011-138.nasl - Type : ACT_GATHER_INFO
2012-01-31 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2395.nasl - Type : ACT_GATHER_INFO
2011-12-13 Name : The remote SuSE 11 host is missing a security update.
File : suse_11_wireshark-111013.nasl - Type : ACT_GATHER_INFO
2011-12-13 Name : The remote SuSE 11 host is missing a security update.
File : suse_11_wireshark-111115.nasl - Type : ACT_GATHER_INFO
2011-12-13 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_wireshark-7796.nasl - Type : ACT_GATHER_INFO
2011-10-24 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_wireshark-7795.nasl - Type : ACT_GATHER_INFO
2011-10-21 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2324.nasl - Type : ACT_GATHER_INFO
2011-10-10 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201110-02.nasl - Type : ACT_GATHER_INFO
2011-10-03 Name : The remote Fedora host is missing a security update.
File : fedora_2011-12399.nasl - Type : ACT_GATHER_INFO
2011-09-20 Name : The remote Fedora host is missing a security update.
File : fedora_2011-12423.nasl - Type : ACT_GATHER_INFO
2011-09-19 Name : The remote Fedora host is missing a security update.
File : fedora_2011-12403.nasl - Type : ACT_GATHER_INFO
2011-09-12 Name : The remote Windows host contains an application that is affected by multiple ...
File : wireshark_1_4_9.nasl - Type : ACT_GATHER_INFO
2011-09-12 Name : The remote Windows host contains an application that is affected by multiple ...
File : wireshark_1_6_2.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:42:26
  • Multiple Updates