Executive Summary
Summary | |
---|---|
Title | wireshark security update |
Informations | |||
---|---|---|---|
Name | DSA-2324 | First vendor Publication | 2011-10-20 |
Vendor | Debian | Last vendor Modification | 2011-10-20 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Microsoft Vulnerability Research group discovered that insecure load path handling could lead to execution of arbitrary Lua script code. For the oldstable distribution (lenny), this problem has been fixed in version 1.0.2-3+lenny15. This build will be released shortly. For the stable distribution (squeeze), this problem has been fixed in version 1.2.11-6+squeeze4. For the unstable distribution (sid), this problem has been fixed in version 1.6.2-1. We recommend that you upgrade your wireshark packages. |
Original Source
Url : http://www.debian.org/security/2011/dsa-2324 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:14837 | |||
Oval ID: | oval:org.mitre.oval:def:14837 | ||
Title: | DSA-2324-1 wireshark -- programming error | ||
Description: | The Microsoft Vulnerability Research group discovered that insecure load path handling could lead to execution of arbitrary Lua script code. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2324-1 CVE-2011-3360 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | wireshark |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15059 | |||
Oval ID: | oval:org.mitre.oval:def:15059 | ||
Title: | Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2 | ||
Description: | Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2 allows local users to gain privileges via a Trojan horse Lua script in an unspecified directory. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2011-3360 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP Microsoft Windows 8 Microsoft Windows Server 2012 | Product(s): | Wireshark |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Wireshark Lua Untrusted Search Path vulnerability | More info here |
OpenVAS Exploits
Date | Description |
---|---|
2012-05-02 | Name : Wireshark Code Execution and Denial of Service Vulnerabilities (Mac OS X) File : nvt/gb_wireshark_code_exec_n_dos_vuln_macosx.nasl |
2012-02-12 | Name : Gentoo Security Advisory GLSA 201110-02 (wireshark) File : nvt/glsa_201110_02.nasl |
2012-02-11 | Name : Debian Security Advisory DSA 2324-1 (wireshark) File : nvt/deb_2324_1.nasl |
2011-10-04 | Name : Wireshark Lua Script File Arbitrary Code Execution Vulnerability (Windows) File : nvt/gb_wireshark_lua_script_code_exec_vuln_win.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
75347 | Wireshark DLL Hijacking Path Subversion Local Privilege Escalation |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Wireshark console.lua file load exploit attempt RuleID : 23239 - Revision : 9 - Type : SERVER-OTHER |
2014-01-10 | Wireshark console.lua file load exploit attempt RuleID : 23238 - Revision : 10 - Type : NETBIOS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_wireshark_20111205.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_wireshark-111013.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_wireshark-111013.nasl - Type : ACT_GATHER_INFO |
2012-09-06 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-138.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_wireshark-111013.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_wireshark-7796.nasl - Type : ACT_GATHER_INFO |
2011-10-24 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_wireshark-7795.nasl - Type : ACT_GATHER_INFO |
2011-10-21 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2324.nasl - Type : ACT_GATHER_INFO |
2011-10-10 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201110-02.nasl - Type : ACT_GATHER_INFO |
2011-09-12 | Name : The remote Windows host contains an application that is affected by multiple ... File : wireshark_1_4_9.nasl - Type : ACT_GATHER_INFO |
2011-09-12 | Name : The remote Windows host contains an application that is affected by multiple ... File : wireshark_1_6_2.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:30:30 |
|