Summary
This host is installed with Wireshark and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to crash the application, resulting in denial of service condition.
Impact Level: Application
Solution
Upgrade to the Wireshark version 1.8.7 or later,
For updates refer to http://www.wireshark.org/download
Insight
Multiple flaws are due to errors in Websocket, MySQL, ETCH, MPEG DSM-CC, DCP ETSI, PPP CCP and GTPv2 dissectors.
Affected
Wireshark versions 1.8.x before 1.8.7 on Windows
References
Severity
Classification
-
CVE CVE-2013-3555, CVE-2013-3558, CVE-2013-3559, CVE-2013-3560, CVE-2013-3561, CVE-2013-3562 -
CVSS Base Score: 7.8
AV:N/AC:L/Au:N/C:N/I:N/A:C
Related Vulnerabilities
- CA Multiple Products 'arclib' Component DoS Vulnerability (Win)
- Adobe Reader PDF Handling Denial Of Service Vulnerability (Linux)
- ClamAV get_unicode_name() Off-By-One Heap based BOF Vulnerability
- EMC Data Protection Advisor NULL Pointer Dereference Denial of Service Vulnerability
- Apple QuickTime Multiple Vulnerabilities - Jan09 (Win)