Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2023.6262.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6262-1)
Summary:The remote host is missing an update for the 'wireshark' package(s) announced via the USN-6262-1 advisory.
Description:Summary:
The remote host is missing an update for the 'wireshark' package(s) announced via the USN-6262-1 advisory.

Vulnerability Insight:
It was discovered that Wireshark did not properly handle certain
NFS packages when certain configuration options were enabled.
An attacker could possibly use this issue to cause
Wireshark to crash, resulting in a denial of service. (CVE-2020-13164)

It was discovered that Wireshark did not properly handle certain GVCP
packages. An attacker could possibly use this issue to cause
Wireshark to crash, resulting in a denial of service. This issue only
affected Ubuntu 20.04 LTS. (CVE-2020-15466)

It was discovered that Wireshark did not properly handle certain
Kafka packages. An attacker could possibly use this issue to cause
Wireshark to crash, resulting in a denial of service. This issue only
affected Ubuntu 20.04 LTS. (CVE-2020-17498)

It was discovered that Wireshark did not properly handle certain TCP
packages containing an invalid 0xFFFF checksum. An attacker could
possibly use this issue to cause Wireshark to crash, resulting in
a denial of service. (CVE-2020-25862)

It was discovered that Wireshark did not properly handle certain
MIME packages containing invalid parts. An attacker could
possibly use this issue to cause Wireshark to crash, resulting in
a denial of service. (CVE-2020-25863)

Affected Software/OS:
'wireshark' package(s) on Ubuntu 14.04, Ubuntu 16.04, Ubuntu 18.04, Ubuntu 20.04.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-13164
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5UOISPQTRCZGQLKBVXEDL72AEXEHS425/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNV3EYL4JBWCR22TJO3PH7ADUVS5RWSU/
https://security.gentoo.org/glsa/202007-13
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16476
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=e6e98eab8e5e0bbc982cfdc808f2469d7cab6c5a
https://www.wireshark.org/security/wnpa-sec-2020-08.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html
SuSE Security Announcement: openSUSE-SU-2020:1188 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html
SuSE Security Announcement: openSUSE-SU-2020:1199 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-15466
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16029
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=11f40896b696e4e8c7f8b2ad96028404a83a51a4
https://www.wireshark.org/security/wnpa-sec-2020-09.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-17498
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G7LO7DAPN33FL4JQ7DDPB76SIEFGMZSQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AII7UYDPNKYE75AZL45M6HAV2COP7F6S/
https://security.gentoo.org/glsa/202008-14
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16672
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=76afda963de4f0b9be24f2d8e873990a5cbf221b
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.wireshark.org/security/wnpa-sec-2020-10.html
SuSE Security Announcement: openSUSE-SU-2020:1878 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html
SuSE Security Announcement: openSUSE-SU-2020:1882 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-25862
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IGRYKW4XLR44YDWTAH547ODYYBYPB2D/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DQHPKZFQ7W3X34RYN3FWFYCFJD4FXJW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUHMK5HYTUUDXA64T2TAMAFMYV674QBW/
https://gitlab.com/wireshark/wireshark/-/commit/7f3fe6164a68b76d9988c4253b24d43f498f1753
https://gitlab.com/wireshark/wireshark/-/issues/16816
https://www.wireshark.org/security/wnpa-sec-2020-12.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-25863
https://gitlab.com/wireshark/wireshark/-/commit/5803c7b87b3414cdb8bf502af50bb406ca774482
https://gitlab.com/wireshark/wireshark/-/issues/16741
https://www.wireshark.org/security/wnpa-sec-2020-11.html
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.