Summary
This host is installed with Wireshark and is prone to multiple denial of service vulnerabilities.
Impact
Successful exploitation will allow remote attackers to cause denial of service or to consume excessive CPU resources.
Impact Level: Application
Solution
Upgrade to the Wireshark version 1.6.14 or 1.8.6 or later, For updates refer to http://www.wireshark.org/download
Insight
Multiple flaws are due to errors in MS-MMS, RTPS, RTPS2, Mount, AMPQ, ACN, CIMD, FCSP and DTLS dissectors.
Affected
Wireshark 1.6.x before 1.6.14, 1.8.x before 1.8.6 on Windows
References
Severity
Classification
-
CVE CVE-2013-2478, CVE-2013-2480, CVE-2013-2481, CVE-2013-2482, CVE-2013-2483, CVE-2013-2484, CVE-2013-2485, CVE-2013-2488 -
CVSS Base Score: 6.1
AV:A/AC:L/Au:N/C:N/I:N/A:C
Related Vulnerabilities
- CUPS IPP Packets Processing Denial of Service Vulnerability
- FreeSWITCH 'switch_regex.c' Multiple Buffer Overflow Vulnerabilities
- Apache Subversion 'mod_dav_svn' log REPORT Request DoS Vulnerability
- Asterisk RTP Text Frames Denial Of Service Vulnerability
- FreeType Memory Corruption and Buffer Overflow Vulnerabilities (Windows)