Summary
This host is installed with Wireshark and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code in the context of the application, to crash the affected application, or to consume excessive CPU resources.
Impact Level: System/Application
Solution
Upgrade to the Wireshark version 1.8.3 or later,
For updates refer to http://www.wireshark.org/download
Insight
Errors in the HSRP, PPP and LDP dissectors when processing certain packets can be exploited to cause an infinite loop and consume CPU resources or a buffer overflow.
Affected
Wireshark versions 1.8.x prior to 1.8.3 on windows
References
- http://secunia.com/advisories/50843/
- http://www.osvdb.org/85884
- http://www.wireshark.org/security/wnpa-sec-2012-26.html
- http://www.wireshark.org/security/wnpa-sec-2012-27.html
- http://www.wireshark.org/security/wnpa-sec-2012-29.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7581
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7668
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2012-5237, CVE-2012-5238, CVE-2012-5240 -
CVSS Base Score: 5.8
AV:A/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Apple QuickTime Multiple Arbitrary Code Execution Vulnerabilities (Win)
- aMSN session hijack vulnerability (Windows)
- Apache Tomcat XML External Entity Information Disclosure Vulnerability
- Adobe Reader Information Disclosure & Denial of Service Vulnerabilities (Windows)
- Adobe Digital Edition Information Disclosure Vulnerability (Mac OS X)