Executive Summary

Informations
Name CVE-2010-4300 First vendor Publication 2010-11-26
Vendor Cve Last vendor Modification 2017-09-19

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Heap-based buffer overflow in the dissect_ldss_transfer function (epan/dissectors/packet-ldss.c) in the LDSS dissector in Wireshark 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an LDSS packet with a long digest line that triggers memory corruption.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4300

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:14287
 
Oval ID: oval:org.mitre.oval:def:14287
Title: Heap-based buffer overflow in the dissect_ldss_transfer function in the LDSS dissector in Wireshark 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1
Description: Heap-based buffer overflow in the dissect_ldss_transfer function (epan/dissectors/packet-ldss.c) in the LDSS dissector in Wireshark 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an LDSS packet with a long digest line that triggers memory corruption.
Family: windows Class: vulnerability
Reference(s): CVE-2010-4300
Version: 6
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Wireshark
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21990
 
Oval ID: oval:org.mitre.oval:def:21990
Title: RHSA-2010:0924: wireshark security update (Moderate)
Description: Heap-based buffer overflow in the dissect_ldss_transfer function (epan/dissectors/packet-ldss.c) in the LDSS dissector in Wireshark 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an LDSS packet with a long digest line that triggers memory corruption.
Family: unix Class: patch
Reference(s): RHSA-2010:0924-01
CVE-2010-3445
CVE-2010-4300
Version: 29
Platform(s): Red Hat Enterprise Linux 6
Product(s): wireshark
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23387
 
Oval ID: oval:org.mitre.oval:def:23387
Title: ELSA-2010:0924: wireshark security update (Moderate)
Description: Heap-based buffer overflow in the dissect_ldss_transfer function (epan/dissectors/packet-ldss.c) in the LDSS dissector in Wireshark 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an LDSS packet with a long digest line that triggers memory corruption.
Family: unix Class: patch
Reference(s): ELSA-2010:0924-01
CVE-2010-3445
CVE-2010-4300
Version: 13
Platform(s): Oracle Linux 6
Product(s): wireshark
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 15

OpenVAS Exploits

Date Description
2012-05-04 Name : Wireshark LDSS Dissector Buffer Overflow Vulnerability (Mac OS X)
File : nvt/gb_wireshark_ldss_dissector_bof_vuln_macosx.nasl
2012-02-12 Name : Gentoo Security Advisory GLSA 201110-02 (wireshark)
File : nvt/glsa_201110_02.nasl
2010-12-09 Name : Wireshark LDSS Dissector Buffer Overflow Vulnerability (Win)
File : nvt/gb_wireshark_ldss_dissector_bof_vuln_win.nasl
2010-12-02 Name : Mandriva Update for wireshark MDVSA-2010:242 (wireshark)
File : nvt/gb_mandriva_MDVSA_2010_242.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
69354 Wireshark LDSS Dissector epan/dissectors/packet-ldss.c dissect_ldss_transfer(...

Wireshark is prone to an overflow condition. The program fails to properly sanitize user-supplied input resulting in a heap overflow. With a specially crafted request, a remote attacker can potentially cause a denial of service.

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_wireshark-101222.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20101130_wireshark_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2011-10-10 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201110-02.nasl - Type : ACT_GATHER_INFO
2011-05-05 Name : The remote openSUSE host is missing a security update.
File : suse_11_1_wireshark-101222.nasl - Type : ACT_GATHER_INFO
2011-05-05 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_wireshark-101222.nasl - Type : ACT_GATHER_INFO
2011-04-07 Name : The remote SuSE 11 host is missing a security update.
File : suse_11_wireshark-110331.nasl - Type : ACT_GATHER_INFO
2010-12-01 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2010-0924.nasl - Type : ACT_GATHER_INFO
2010-11-29 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2010-242.nasl - Type : ACT_GATHER_INFO
2010-11-22 Name : The remote Windows host contains an application that is affected by multiple ...
File : wireshark_1_4_2.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/44987
CONFIRM http://blogs.sun.com/security/entry/buffer_overflow_vulnerability_in_wireshark
http://www.wireshark.org/security/wnpa-sec-2010-13.html
http://www.wireshark.org/security/wnpa-sec-2010-14.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5318
EXPLOIT-DB http://www.exploit-db.com/exploits/15676
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2010:242
OSVDB http://osvdb.org/69354
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
REDHAT http://www.redhat.com/support/errata/RHSA-2010-0924.html
SECTRACK http://www.securitytracker.com/id?1024762
SECUNIA http://secunia.com/advisories/42290
http://secunia.com/advisories/42411
http://secunia.com/advisories/42877
http://secunia.com/advisories/43068
SUSE http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
VUPEN http://www.vupen.com/english/advisories/2010/3038
http://www.vupen.com/english/advisories/2010/3068
http://www.vupen.com/english/advisories/2010/3093
http://www.vupen.com/english/advisories/2011/0076
http://www.vupen.com/english/advisories/2011/0212
http://www.vupen.com/english/advisories/2011/0404

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2021-05-04 12:12:50
  • Multiple Updates
2021-04-22 01:13:28
  • Multiple Updates
2020-05-23 00:26:56
  • Multiple Updates
2017-09-19 09:24:04
  • Multiple Updates
2016-06-28 18:22:53
  • Multiple Updates
2016-04-26 20:14:43
  • Multiple Updates
2014-06-14 13:29:47
  • Multiple Updates
2014-02-17 10:58:40
  • Multiple Updates
2013-05-10 23:37:18
  • Multiple Updates