Untrusted search path vulnerability in Wireshark 0.8.4 through 1.0.15 and 1.2.0 through 1.2.10 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse airpcap.dll, and possibly other DLLs, that is located in the same folder as a file that automatically launches Wireshark.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wireshark | Wireshark | * | 1.2.10 (including) |
Wireshark | Wireshark | 0.99.2 (including) | 0.99.2 (including) |
Wireshark | Wireshark | 0.99.3 (including) | 0.99.3 (including) |
Wireshark | Wireshark | 0.99.4 (including) | 0.99.4 (including) |
Wireshark | Wireshark | 0.99.5 (including) | 0.99.5 (including) |
Wireshark | Wireshark | 0.99.6 (including) | 0.99.6 (including) |
Wireshark | Wireshark | 0.99.7 (including) | 0.99.7 (including) |
Wireshark | Wireshark | 0.99.8 (including) | 0.99.8 (including) |
Wireshark | Wireshark | 1.0.0 (including) | 1.0.0 (including) |
Wireshark | Wireshark | 1.0.1 (including) | 1.0.1 (including) |
Wireshark | Wireshark | 1.0.2 (including) | 1.0.2 (including) |
Wireshark | Wireshark | 1.0.3 (including) | 1.0.3 (including) |
Wireshark | Wireshark | 1.0.4 (including) | 1.0.4 (including) |
Wireshark | Wireshark | 1.0.5 (including) | 1.0.5 (including) |
Wireshark | Wireshark | 1.0.6 (including) | 1.0.6 (including) |
Wireshark | Wireshark | 1.0.7 (including) | 1.0.7 (including) |
Wireshark | Wireshark | 1.0.8 (including) | 1.0.8 (including) |
Wireshark | Wireshark | 1.0.9 (including) | 1.0.9 (including) |
Wireshark | Wireshark | 1.0.10 (including) | 1.0.10 (including) |
Wireshark | Wireshark | 1.0.11 (including) | 1.0.11 (including) |
Wireshark | Wireshark | 1.0.12 (including) | 1.0.12 (including) |
Wireshark | Wireshark | 1.2.0 (including) | 1.2.0 (including) |
Wireshark | Wireshark | 1.2.1 (including) | 1.2.1 (including) |
Wireshark | Wireshark | 1.2.2 (including) | 1.2.2 (including) |
Wireshark | Wireshark | 1.2.3 (including) | 1.2.3 (including) |
Wireshark | Wireshark | 1.2.4 (including) | 1.2.4 (including) |
Wireshark | Wireshark | 1.2.5 (including) | 1.2.5 (including) |
Wireshark | Wireshark | 1.2.6 (including) | 1.2.6 (including) |
Wireshark | Wireshark | 1.2.7 (including) | 1.2.7 (including) |
Wireshark | Wireshark | 1.2.8 (including) | 1.2.8 (including) |
Wireshark | Wireshark | 1.2.9 (including) | 1.2.9 (including) |