Lucene search

K
saintSAINT CorporationSAINT:E9D554C998DCDCB9C21FF5ACE3EB6B88
HistoryFeb 17, 2010 - 12:00 a.m.

Wireshark LWRES dissector buffer overflow

2010-02-1700:00:00
SAINT Corporation
my.saintcorporation.com
19

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.941 High

EPSS

Percentile

99.1%

Added: 02/17/2010
CVE: CVE-2010-0304
BID: 37985
OSVDB: 61987

Background

Wireshark is a network packet analyzer.

Problem

A buffer overflow vulnerability in the LWRES dissector allows command execution when a user sends a specially crafted datagram over a network which is being analyzed by Wireshark.

Resolution

Upgrade to Wireshark 1.2.6 or higher.

References

<http://www.wireshark.org/security/wnpa-sec-2010-02.html&gt;

Limitations

Exploit works on Wireshark 1.0.3. Wireshark must be configured to capture and analyze the malicious traffic in order for the exploit to succeed.

Platforms

Windows XP

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.941 High

EPSS

Percentile

99.1%