CVE-2010-3133

Untrusted search path vulnerability in Wireshark 0.8.4 through 1.0.15 and 1.2.0 through 1.2.10 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse airpcap.dll, and possibly other DLLs, that is located in the same folder as a file that automatically launches Wireshark.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.10:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.11:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.12:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.9:*:*:*:*:*:*:*

History

21 Nov 2024, 01:18

Type Values Removed Values Added
References () http://secunia.com/advisories/41064 - Vendor Advisory () http://secunia.com/advisories/41064 - Vendor Advisory
References () http://www.exploit-db.com/exploits/14721/ - Exploit () http://www.exploit-db.com/exploits/14721/ - Exploit
References () http://www.vupen.com/english/advisories/2010/2165 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/2165 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/2243 - () http://www.vupen.com/english/advisories/2010/2243 -
References () http://www.wireshark.org/security/wnpa-sec-2010-09.html - Vendor Advisory () http://www.wireshark.org/security/wnpa-sec-2010-09.html - Vendor Advisory
References () http://www.wireshark.org/security/wnpa-sec-2010-10.html - Vendor Advisory () http://www.wireshark.org/security/wnpa-sec-2010-10.html - Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11498 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11498 -

Information

Published : 2010-08-26 18:36

Updated : 2024-11-21 01:18


NVD link : CVE-2010-3133

Mitre link : CVE-2010-3133

CVE.ORG link : CVE-2010-3133


JSON object : View

Products Affected

wireshark

  • wireshark