Executive Summary

Informations
Name CVE-2010-2992 First vendor Publication 2010-08-13
Vendor Cve Last vendor Modification 2017-09-19

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

packet-gsm_a_rr.c in the GSM A RR dissector in Wireshark 1.2.2 through 1.2.9 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2992

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:11651
 
Oval ID: oval:org.mitre.oval:def:11651
Title: Vulnerability in packet-gsm_a_rr.c in the GSM A RR dissector in Wireshark
Description: packet-gsm_a_rr.c in the GSM A RR dissector in Wireshark 1.2.2 through 1.2.9 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference.
Family: windows Class: vulnerability
Reference(s): CVE-2010-2992
Version: 9
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Wireshark
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8

OpenVAS Exploits

Date Description
2012-02-12 Name : Gentoo Security Advisory GLSA 201110-02 (wireshark)
File : nvt/glsa_201110_02.nasl
2010-09-07 Name : Fedora Update for wireshark FEDORA-2010-13416
File : nvt/gb_fedora_2010_13416_wireshark_fc13.nasl
2010-09-07 Name : Fedora Update for wireshark FEDORA-2010-13427
File : nvt/gb_fedora_2010_13427_wireshark_fc12.nasl
2010-08-19 Name : Wireshark 'packet-gsm_a_rr.c' Denial of Service Vulnerability (Win)
File : nvt/gb_wireshark_dissector_dos_vuln_win.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
66792 Wireshark GSM A RR Dissector NULL Dereference DoS

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_wireshark-101222.nasl - Type : ACT_GATHER_INFO
2011-10-10 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201110-02.nasl - Type : ACT_GATHER_INFO
2011-05-05 Name : The remote openSUSE host is missing a security update.
File : suse_11_1_wireshark-101222.nasl - Type : ACT_GATHER_INFO
2011-05-05 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_wireshark-101222.nasl - Type : ACT_GATHER_INFO
2011-04-07 Name : The remote SuSE 11 host is missing a security update.
File : suse_11_wireshark-110331.nasl - Type : ACT_GATHER_INFO
2010-09-03 Name : The remote Fedora host is missing a security update.
File : fedora_2010-13416.nasl - Type : ACT_GATHER_INFO
2010-09-03 Name : The remote Fedora host is missing a security update.
File : fedora_2010-13427.nasl - Type : ACT_GATHER_INFO
2010-08-02 Name : The remote host has an application that is affected by multiple vulnerabilities.
File : wireshark_1_2_10.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM http://www.wireshark.org/docs/relnotes/wireshark-1.2.10.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4897
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
SECUNIA http://secunia.com/advisories/42877
http://secunia.com/advisories/43068
SUSE http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
VUPEN http://www.vupen.com/english/advisories/2011/0076
http://www.vupen.com/english/advisories/2011/0212

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
Date Informations
2021-05-04 12:11:53
  • Multiple Updates
2021-04-22 01:12:29
  • Multiple Updates
2020-05-23 00:26:16
  • Multiple Updates
2017-09-19 09:23:53
  • Multiple Updates
2016-12-22 13:22:45
  • Multiple Updates
2016-05-03 13:30:30
  • Multiple Updates
2016-04-29 13:31:41
  • Multiple Updates
2016-04-26 20:01:13
  • Multiple Updates
2016-01-28 13:25:57
  • Multiple Updates
2015-12-24 13:25:51
  • Multiple Updates
2015-12-05 13:26:24
  • Multiple Updates
2014-06-14 13:29:05
  • Multiple Updates
2014-02-17 10:56:51
  • Multiple Updates
2013-05-10 23:30:24
  • Multiple Updates