Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name. NOTE: some of these details are obtained from third party information.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wireshark | Wireshark | * | 1.0.5 (including) |
Wireshark | Wireshark | 0.6 (including) | 0.6 (including) |
Wireshark | Wireshark | 0.7.9 (including) | 0.7.9 (including) |
Wireshark | Wireshark | 0.8.16 (including) | 0.8.16 (including) |
Wireshark | Wireshark | 0.8.19 (including) | 0.8.19 (including) |
Wireshark | Wireshark | 0.9.5 (including) | 0.9.5 (including) |
Wireshark | Wireshark | 0.9.7 (including) | 0.9.7 (including) |
Wireshark | Wireshark | 0.9.8 (including) | 0.9.8 (including) |
Wireshark | Wireshark | 0.9.10 (including) | 0.9.10 (including) |
Wireshark | Wireshark | 0.9.14 (including) | 0.9.14 (including) |
Wireshark | Wireshark | 0.10 (including) | 0.10 (including) |
Wireshark | Wireshark | 0.10.1 (including) | 0.10.1 (including) |
Wireshark | Wireshark | 0.10.2 (including) | 0.10.2 (including) |
Wireshark | Wireshark | 0.10.3 (including) | 0.10.3 (including) |
Wireshark | Wireshark | 0.10.4 (including) | 0.10.4 (including) |
Wireshark | Wireshark | 0.10.5 (including) | 0.10.5 (including) |
Wireshark | Wireshark | 0.10.6 (including) | 0.10.6 (including) |
Wireshark | Wireshark | 0.10.7 (including) | 0.10.7 (including) |
Wireshark | Wireshark | 0.10.8 (including) | 0.10.8 (including) |
Wireshark | Wireshark | 0.10.9 (including) | 0.10.9 (including) |
Wireshark | Wireshark | 0.10.10 (including) | 0.10.10 (including) |
Wireshark | Wireshark | 0.10.11 (including) | 0.10.11 (including) |
Wireshark | Wireshark | 0.10.12 (including) | 0.10.12 (including) |
Wireshark | Wireshark | 0.10.13 (including) | 0.10.13 (including) |
Wireshark | Wireshark | 0.10.14 (including) | 0.10.14 (including) |
Wireshark | Wireshark | 0.99 (including) | 0.99 (including) |
Wireshark | Wireshark | 0.99.0 (including) | 0.99.0 (including) |
Wireshark | Wireshark | 0.99.1 (including) | 0.99.1 (including) |
Wireshark | Wireshark | 0.99.2 (including) | 0.99.2 (including) |
Wireshark | Wireshark | 0.99.3 (including) | 0.99.3 (including) |
Wireshark | Wireshark | 0.99.4 (including) | 0.99.4 (including) |
Wireshark | Wireshark | 0.99.5 (including) | 0.99.5 (including) |
Wireshark | Wireshark | 0.99.6 (including) | 0.99.6 (including) |
Wireshark | Wireshark | 0.99.6a (including) | 0.99.6a (including) |
Wireshark | Wireshark | 0.99.7 (including) | 0.99.7 (including) |
Wireshark | Wireshark | 0.99.8 (including) | 0.99.8 (including) |
Wireshark | Wireshark | 1.0 (including) | 1.0 (including) |
Wireshark | Wireshark | 1.0.0 (including) | 1.0.0 (including) |
Wireshark | Wireshark | 1.0.1 (including) | 1.0.1 (including) |
Wireshark | Wireshark | 1.0.2 (including) | 1.0.2 (including) |
Wireshark | Wireshark | 1.0.3 (including) | 1.0.3 (including) |
Wireshark | Wireshark | 1.0.4 (including) | 1.0.4 (including) |
Red Hat Enterprise Linux 3 | RedHat | wireshark-0:1.0.8-EL3.1 | * |
Red Hat Enterprise Linux 4 | RedHat | wireshark-0:1.0.8-1.el4_8.1 | * |
Red Hat Enterprise Linux 5 | RedHat | wireshark-0:1.0.8-1.el5_3.1 | * |
Wireshark | Ubuntu | gutsy | * |
Wireshark | Ubuntu | hardy | * |
Wireshark | Ubuntu | intrepid | * |
Wireshark | Ubuntu | jaunty | * |
Wireshark | Ubuntu | karmic | * |
Wireshark | Ubuntu | upstream | * |