Wireshark / Ethereal < 1.2.11 / 1.0.16 Path Subversion Arbitrary DLL Injection Code Execution

high Nessus Plugin ID 48943

Language:

Synopsis

The remote Windows host contains an application that allows arbitrary code execution.

Description

The installed version of Wireshark or Ethereal is 1.2.0 - 1.2.10 or 0.8.4 - 1.0.15. Such versions are affected by the following vulnerability :

- The application uses a fixed path to look for specific files or libraries, such as for 'airpcap.dll', and this path includes directories that may not be trusted or under user control. If a malicious DLL with the same name as a required DLL is located in the application's current working directory, the malicious DLL will be loaded. (Bug 5133)

Solution

Upgrade to Wireshark version 1.2.11 / 1.0.16 or later.

See Also

https://docs.microsoft.com/en-us/windows/desktop/Dlls/dynamic-link-library-security

http://www.acrossecurity.com/aspr/ASPR-2010-08-18-1-PUB.txt

https://blog.rapid7.com/?p=5325

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5133

https://www.wireshark.org/security/wnpa-sec-2010-09.html

https://www.wireshark.org/security/wnpa-sec-2010-10.html

Plugin Details

Severity: High

ID: 48943

File Name: wireshark_1_2_11.nasl

Version: 1.10

Type: local

Agent: windows

Family: Windows

Published: 8/31/2010

Updated: 3/9/2023

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:wireshark:wireshark

Required KB Items: SMB/Wireshark/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/30/2010

Vulnerability Publication Date: 8/24/2010

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-3133

BID: 42630