Vigil@nce: Wireshark, denials of service
September 2009 by Vigil@nce
Several vulnerabilities of Wireshark can be used by a remote
attacker to create a denial of service.
Severity: 2/4
Consequences: denial of service of service
Provenance: intranet client
Means of attack: no proof of concept, no attack
Ability of attacker: expert (4/4)
Confidence: confirmed by the editor (5/5)
Diffusion of the vulnerable configuration: high (3/3)
Number of vulnerabilities in this bulletin: 5
Creation date: 16/09/2009
IMPACTED PRODUCTS
– Unix - plateform
DESCRIPTION OF THE VULNERABILITY
The Wireshark program captures and displays network packets.
Protocols are decoded by dissectors. They are impacted by several
vulnerabilities.
An attacker can stop the AFS dissector. [grav:2/4; CVE-2009-2562,
wnpa-sec-2009-05]
An attacker can stop the Infiniband dissector. [grav:2/4;
CVE-2009-2563, wnpa-sec-2009-05]
An attacker can force the OpcUa dissector to consume an excessive
amount of CPU and memory resource. [grav:2/4; wnpa-sec-2009-05,
wnpa-sec-2009-06]
An attacker can stop the GSM A RR dissector. [grav:2/4;
wnpa-sec-2009-06]
An attacker can stop the TLS dissector. [grav:2/4; CVE-2009-3243,
wnpa-sec-2009-06]
CHARACTERISTICS
Identifiers: BID-36408, CVE-2009-2562, CVE-2009-2563,
CVE-2009-3243, VIGILANCE-VUL-9026, wnpa-sec-2009-05,
wnpa-sec-2009-06
http://vigilance.fr/vulnerability/Wireshark-denials-of-service-9026