CVE-2010-3133
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/08/2010
Last modified:
11/04/2025
Description
Untrusted search path vulnerability in Wireshark 0.8.4 through 1.0.15 and 1.2.0 through 1.2.10 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse airpcap.dll, and possibly other DLLs, that is located in the same folder as a file that automatically launches Wireshark.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:* | 1.2.10 (including) | |
| cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/41064
- http://www.exploit-db.com/exploits/14721/
- http://www.vupen.com/english/advisories/2010/2165
- http://www.vupen.com/english/advisories/2010/2243
- http://www.wireshark.org/security/wnpa-sec-2010-09.html
- http://www.wireshark.org/security/wnpa-sec-2010-10.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11498
- http://secunia.com/advisories/41064
- http://www.exploit-db.com/exploits/14721/
- http://www.vupen.com/english/advisories/2010/2165
- http://www.vupen.com/english/advisories/2010/2243
- http://www.wireshark.org/security/wnpa-sec-2010-09.html
- http://www.wireshark.org/security/wnpa-sec-2010-10.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11498



