CVE Vulnerabilities

CVE-2010-3133

Published: Aug 26, 2010 | Modified: Sep 19, 2017
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
9.3 HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
LOW

Untrusted search path vulnerability in Wireshark 0.8.4 through 1.0.15 and 1.2.0 through 1.2.10 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse airpcap.dll, and possibly other DLLs, that is located in the same folder as a file that automatically launches Wireshark.

Affected Software

Name Vendor Start Version End Version
Wireshark Wireshark * 1.2.10 (including)
Wireshark Wireshark 0.99.2 (including) 0.99.2 (including)
Wireshark Wireshark 0.99.3 (including) 0.99.3 (including)
Wireshark Wireshark 0.99.4 (including) 0.99.4 (including)
Wireshark Wireshark 0.99.5 (including) 0.99.5 (including)
Wireshark Wireshark 0.99.6 (including) 0.99.6 (including)
Wireshark Wireshark 0.99.7 (including) 0.99.7 (including)
Wireshark Wireshark 0.99.8 (including) 0.99.8 (including)
Wireshark Wireshark 1.0.0 (including) 1.0.0 (including)
Wireshark Wireshark 1.0.1 (including) 1.0.1 (including)
Wireshark Wireshark 1.0.2 (including) 1.0.2 (including)
Wireshark Wireshark 1.0.3 (including) 1.0.3 (including)
Wireshark Wireshark 1.0.4 (including) 1.0.4 (including)
Wireshark Wireshark 1.0.5 (including) 1.0.5 (including)
Wireshark Wireshark 1.0.6 (including) 1.0.6 (including)
Wireshark Wireshark 1.0.7 (including) 1.0.7 (including)
Wireshark Wireshark 1.0.8 (including) 1.0.8 (including)
Wireshark Wireshark 1.0.9 (including) 1.0.9 (including)
Wireshark Wireshark 1.0.10 (including) 1.0.10 (including)
Wireshark Wireshark 1.0.11 (including) 1.0.11 (including)
Wireshark Wireshark 1.0.12 (including) 1.0.12 (including)
Wireshark Wireshark 1.2.0 (including) 1.2.0 (including)
Wireshark Wireshark 1.2.1 (including) 1.2.1 (including)
Wireshark Wireshark 1.2.2 (including) 1.2.2 (including)
Wireshark Wireshark 1.2.3 (including) 1.2.3 (including)
Wireshark Wireshark 1.2.4 (including) 1.2.4 (including)
Wireshark Wireshark 1.2.5 (including) 1.2.5 (including)
Wireshark Wireshark 1.2.6 (including) 1.2.6 (including)
Wireshark Wireshark 1.2.7 (including) 1.2.7 (including)
Wireshark Wireshark 1.2.8 (including) 1.2.8 (including)
Wireshark Wireshark 1.2.9 (including) 1.2.9 (including)

References