CVE Vulnerabilities

CVE-2009-1210

Use of Externally-Controlled Format String

Published: Apr 01, 2009 | Modified: Apr 09, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
10 HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
5.8 MODERATE
AV:A/AC:L/Au:N/C:P/I:P/A:P
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name. NOTE: some of these details are obtained from third party information.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

NameVendorStart VersionEnd Version
WiresharkWireshark*1.0.5 (including)
WiresharkWireshark0.6 (including)0.6 (including)
WiresharkWireshark0.7.9 (including)0.7.9 (including)
WiresharkWireshark0.8.16 (including)0.8.16 (including)
WiresharkWireshark0.8.19 (including)0.8.19 (including)
WiresharkWireshark0.9.5 (including)0.9.5 (including)
WiresharkWireshark0.9.7 (including)0.9.7 (including)
WiresharkWireshark0.9.8 (including)0.9.8 (including)
WiresharkWireshark0.9.10 (including)0.9.10 (including)
WiresharkWireshark0.9.14 (including)0.9.14 (including)
WiresharkWireshark0.10 (including)0.10 (including)
WiresharkWireshark0.10.1 (including)0.10.1 (including)
WiresharkWireshark0.10.2 (including)0.10.2 (including)
WiresharkWireshark0.10.3 (including)0.10.3 (including)
WiresharkWireshark0.10.4 (including)0.10.4 (including)
WiresharkWireshark0.10.5 (including)0.10.5 (including)
WiresharkWireshark0.10.6 (including)0.10.6 (including)
WiresharkWireshark0.10.7 (including)0.10.7 (including)
WiresharkWireshark0.10.8 (including)0.10.8 (including)
WiresharkWireshark0.10.9 (including)0.10.9 (including)
WiresharkWireshark0.10.10 (including)0.10.10 (including)
WiresharkWireshark0.10.11 (including)0.10.11 (including)
WiresharkWireshark0.10.12 (including)0.10.12 (including)
WiresharkWireshark0.10.13 (including)0.10.13 (including)
WiresharkWireshark0.10.14 (including)0.10.14 (including)
WiresharkWireshark0.99 (including)0.99 (including)
WiresharkWireshark0.99.0 (including)0.99.0 (including)
WiresharkWireshark0.99.1 (including)0.99.1 (including)
WiresharkWireshark0.99.2 (including)0.99.2 (including)
WiresharkWireshark0.99.3 (including)0.99.3 (including)
WiresharkWireshark0.99.4 (including)0.99.4 (including)
WiresharkWireshark0.99.5 (including)0.99.5 (including)
WiresharkWireshark0.99.6 (including)0.99.6 (including)
WiresharkWireshark0.99.6a (including)0.99.6a (including)
WiresharkWireshark0.99.7 (including)0.99.7 (including)
WiresharkWireshark0.99.8 (including)0.99.8 (including)
WiresharkWireshark1.0 (including)1.0 (including)
WiresharkWireshark1.0.0 (including)1.0.0 (including)
WiresharkWireshark1.0.1 (including)1.0.1 (including)
WiresharkWireshark1.0.2 (including)1.0.2 (including)
WiresharkWireshark1.0.3 (including)1.0.3 (including)
WiresharkWireshark1.0.4 (including)1.0.4 (including)
Red Hat Enterprise Linux 3RedHatwireshark-0:1.0.8-EL3.1*
Red Hat Enterprise Linux 4RedHatwireshark-0:1.0.8-1.el4_8.1*
Red Hat Enterprise Linux 5RedHatwireshark-0:1.0.8-1.el5_3.1*
WiresharkUbuntugutsy*
WiresharkUbuntuhardy*
WiresharkUbuntuintrepid*
WiresharkUbuntujaunty*
WiresharkUbuntukarmic*
WiresharkUbuntuupstream*

Potential Mitigations

References