CVE Vulnerabilities

CVE-2009-1210

Use of Externally-Controlled Format String

Published: Apr 01, 2009 | Modified: Nov 21, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
10 HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
5.8 MODERATE
AV:A/AC:L/Au:N/C:P/I:P/A:P
RedHat/V3
Ubuntu
MEDIUM

Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name. NOTE: some of these details are obtained from third party information.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

Name Vendor Start Version End Version
Wireshark Wireshark * 1.0.5 (including)
Wireshark Wireshark 0.6 (including) 0.6 (including)
Wireshark Wireshark 0.7.9 (including) 0.7.9 (including)
Wireshark Wireshark 0.8.16 (including) 0.8.16 (including)
Wireshark Wireshark 0.8.19 (including) 0.8.19 (including)
Wireshark Wireshark 0.9.5 (including) 0.9.5 (including)
Wireshark Wireshark 0.9.7 (including) 0.9.7 (including)
Wireshark Wireshark 0.9.8 (including) 0.9.8 (including)
Wireshark Wireshark 0.9.10 (including) 0.9.10 (including)
Wireshark Wireshark 0.9.14 (including) 0.9.14 (including)
Wireshark Wireshark 0.10 (including) 0.10 (including)
Wireshark Wireshark 0.10.1 (including) 0.10.1 (including)
Wireshark Wireshark 0.10.2 (including) 0.10.2 (including)
Wireshark Wireshark 0.10.3 (including) 0.10.3 (including)
Wireshark Wireshark 0.10.4 (including) 0.10.4 (including)
Wireshark Wireshark 0.10.5 (including) 0.10.5 (including)
Wireshark Wireshark 0.10.6 (including) 0.10.6 (including)
Wireshark Wireshark 0.10.7 (including) 0.10.7 (including)
Wireshark Wireshark 0.10.8 (including) 0.10.8 (including)
Wireshark Wireshark 0.10.9 (including) 0.10.9 (including)
Wireshark Wireshark 0.10.10 (including) 0.10.10 (including)
Wireshark Wireshark 0.10.11 (including) 0.10.11 (including)
Wireshark Wireshark 0.10.12 (including) 0.10.12 (including)
Wireshark Wireshark 0.10.13 (including) 0.10.13 (including)
Wireshark Wireshark 0.10.14 (including) 0.10.14 (including)
Wireshark Wireshark 0.99 (including) 0.99 (including)
Wireshark Wireshark 0.99.0 (including) 0.99.0 (including)
Wireshark Wireshark 0.99.1 (including) 0.99.1 (including)
Wireshark Wireshark 0.99.2 (including) 0.99.2 (including)
Wireshark Wireshark 0.99.3 (including) 0.99.3 (including)
Wireshark Wireshark 0.99.4 (including) 0.99.4 (including)
Wireshark Wireshark 0.99.5 (including) 0.99.5 (including)
Wireshark Wireshark 0.99.6 (including) 0.99.6 (including)
Wireshark Wireshark 0.99.6a (including) 0.99.6a (including)
Wireshark Wireshark 0.99.7 (including) 0.99.7 (including)
Wireshark Wireshark 0.99.8 (including) 0.99.8 (including)
Wireshark Wireshark 1.0 (including) 1.0 (including)
Wireshark Wireshark 1.0.0 (including) 1.0.0 (including)
Wireshark Wireshark 1.0.1 (including) 1.0.1 (including)
Wireshark Wireshark 1.0.2 (including) 1.0.2 (including)
Wireshark Wireshark 1.0.3 (including) 1.0.3 (including)
Wireshark Wireshark 1.0.4 (including) 1.0.4 (including)
Red Hat Enterprise Linux 3 RedHat wireshark-0:1.0.8-EL3.1 *
Red Hat Enterprise Linux 4 RedHat wireshark-0:1.0.8-1.el4_8.1 *
Red Hat Enterprise Linux 5 RedHat wireshark-0:1.0.8-1.el5_3.1 *
Wireshark Ubuntu gutsy *
Wireshark Ubuntu hardy *
Wireshark Ubuntu intrepid *
Wireshark Ubuntu jaunty *
Wireshark Ubuntu karmic *
Wireshark Ubuntu upstream *

Potential Mitigations

References