Vulnerability Name:

CVE-2010-3133 (CCN-63771)

Assigned:2010-08-23
Published:2010-08-23
Updated:2017-09-19
Summary:Untrusted search path vulnerability in Wireshark 0.8.4 through 1.0.15 and 1.2.0 through 1.2.10 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse airpcap.dll, and possibly other DLLs, that is located in the same folder as a file that automatically launches Wireshark.
Per: http://cwe.mitre.org/data/definitions/426.html

CWE-426 - 'Untrusted Search Path Vulnerability'
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.3 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.3 High (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2010-3133

Source: CCN
Type: SA41064
Wireshark Insecure Library Loading Vulnerability

Source: SECUNIA
Type: Vendor Advisory
41064

Source: EXPLOIT-DB
Type: Exploit
14721

Source: CCN
Type: Microsoft Security Advisory (2269637)
Insecure Library Loading Could Allow Remote Code Execution

Source: CCN
Type: OSVDB ID: 67504
Wireshark Path Subversion Arbitrary DLL Injection Code Execution

Source: CCN
Type: BID-42630
Wireshark 'airpcap.dll' DLL Loading Arbitrary Code Execution Vulnerability

Source: VUPEN
Type: Vendor Advisory
ADV-2010-2165

Source: VUPEN
Type: UNKNOWN
ADV-2010-2243

Source: CCN
Type: Wireshark Web site
Wireshark 1.4.0, 1.2.11, and 1.0.16 Released

Source: CONFIRM
Type: Vendor Advisory
http://www.wireshark.org/security/wnpa-sec-2010-09.html

Source: CONFIRM
Type: Vendor Advisory
http://www.wireshark.org/security/wnpa-sec-2010-10.html

Source: XF
Type: UNKNOWN
wireshark-dll-ce(63771)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:11498

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database

Vulnerable Configuration:Configuration 1:
  • cpe:/a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.2.9:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:*:*:*:*:*:*:*:* (Version <= 1.2.10)

  • Configuration CCN 1:
  • cpe:/a:wireshark:wireshark:1.2.10:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:11498
    V
    Untrusted search path vulnerability in Wireshark 0.8.4 through 1.0.15 and 1.2.0 through 1.2.10
    2013-08-19
    BACK
    wireshark wireshark 0.99.2
    wireshark wireshark 0.99.3
    wireshark wireshark 0.99.4
    wireshark wireshark 0.99.5
    wireshark wireshark 0.99.6
    wireshark wireshark 0.99.7
    wireshark wireshark 0.99.8
    wireshark wireshark 1.0.0
    wireshark wireshark 1.0.1
    wireshark wireshark 1.0.2
    wireshark wireshark 1.0.3
    wireshark wireshark 1.0.4
    wireshark wireshark 1.0.5
    wireshark wireshark 1.0.6
    wireshark wireshark 1.0.7
    wireshark wireshark 1.0.8
    wireshark wireshark 1.0.9
    wireshark wireshark 1.0.10
    wireshark wireshark 1.0.11
    wireshark wireshark 1.0.12
    wireshark wireshark 1.2.0
    wireshark wireshark 1.2.1
    wireshark wireshark 1.2.2
    wireshark wireshark 1.2.3
    wireshark wireshark 1.2.4
    wireshark wireshark 1.2.5
    wireshark wireshark 1.2.6
    wireshark wireshark 1.2.7
    wireshark wireshark 1.2.8
    wireshark wireshark 1.2.9
    wireshark wireshark *
    wireshark wireshark 1.2.10