CVE-2010-0304
🟡 Monitoruj
Przepełnienie bufora w analizatorze LWRES w Wireshark umożliwia zdalne wywołanie awarii.
CVSS
7.5
EPSS
74.4%
Exploit
poc
Vendor
wireshark
Opis źródłowy (NVD)
Multiple buffer overflows in the LWRES dissector in Wireshark 0.9.15 through 1.0.10 and 1.2.0 through 1.2.5 allow remote attackers to cause a denial of service (crash) via a malformed packet, as demonstrated using a stack-based buffer overflow to the dissect_getaddrsbyname_request function.
buffer-overflow dos exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.5 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 74.4% |
| Opublikowano (NVD) | 2010-02-03 18:30:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-29 01:13:23 UTC |
Referencje
- http://anonsvn.wireshark.org/viewvc/trunk-1.2/epan/dissectors/packet-lwres.c?view=diff&r1=31596&r2=28492&diff_format=h (secalert@redhat.com)
- http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036415.html (secalert@redhat.com)
- http://osvdb.org/61987 (secalert@redhat.com)
- http://secunia.com/advisories/38257 (secalert@redhat.com) [Vendor Advisory]
- http://secunia.com/advisories/38348 (secalert@redhat.com) [Vendor Advisory]
- http://secunia.com/advisories/38829 (secalert@redhat.com)
- http://www.debian.org/security/2010/dsa-1983 (secalert@redhat.com)
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:031 (secalert@redhat.com)
- http://www.metasploit.com/modules/exploit/multi/misc/wireshark_lwres_getaddrbyname (secalert@redhat.com)
- http://www.openwall.com/lists/oss-security/2010/01/29/4 (secalert@redhat.com)
- http://www.securityfocus.com/bid/37985 (secalert@redhat.com) [Exploit]
- http://www.securitytracker.com/id?1023516 (secalert@redhat.com)
- http://www.vupen.com/english/advisories/2010/0239 (secalert@redhat.com) [Patch, Vendor Advisory]
- http://www.wireshark.org/security/wnpa-sec-2010-01.html (secalert@redhat.com)
- http://www.wireshark.org/security/wnpa-sec-2010-02.html (secalert@redhat.com) [Vendor Advisory]
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55951 (secalert@redhat.com)
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8490 (secalert@redhat.com)
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9933 (secalert@redhat.com)