Summary
This host is installed with Wireshark and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to cause denial of service or to consume excessive CPU resources.
Impact Level: Application
Solution
Upgrade to the Wireshark version 1.8.6 or later,
For updates refer to http://www.wireshark.org/download
Insight
Multiple flaws are due to errors in RELOAD, MPLS Echo, CSN.1, HART/IP and TCP dissectors.
Affected
Wireshark versions 1.8.x before 1.8.6 on Windows
References
Severity
Classification
-
CVE CVE-2013-2475, CVE-2013-2476, CVE-2013-2477, CVE-2013-2479, CVE-2013-2486, CVE-2013-2487 -
CVSS Base Score: 7.8
AV:N/AC:L/Au:N/C:N/I:N/A:C
Related Vulnerabilities
- FlashGet FTP PWD Response Remote Buffer Overflow Vulnerability
- Apple Safari DoS or XSS Vulnerability - July09
- Aast! Antivirus 'aavmker4.sys' Denial Of Service Vulnerability (Win)
- Azeotech DAQFactory NETB Datagram Parsing Stack Buffer Overflow Vulnerability
- Asterisk IAX2 Call Number Exhaustion DOS Vulnerability (Linux)