Executive Summary

Informations
Name MDVSA-2011:002 First vendor Publication 2011-01-09
Vendor Mandriva Last vendor Modification 2011-01-09
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability has been found and corrected in wireshark:

Buffer overflow in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression (CVE-2010-4538).

The updated packages have been patched to correct this issue.

Original Source

Url : http://www.mandriva.com/security/advisories?name=MDVSA-2011:002

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:12668
 
Oval ID: oval:org.mitre.oval:def:12668
Title: DSA-2144-1 wireshark -- buffer overflow
Description: It was discovered that a buffer overflow in the ENTTEC dissector may lead to the execution of arbitrary code.
Family: unix Class: patch
Reference(s): DSA-2144-1
CVE-2010-4538
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): wireshark
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:14937
 
Oval ID: oval:org.mitre.oval:def:14937
Title: Buffer overflow in the sect_enttec_dmx_da function in epan/dissectors/packet-enttec.c in Wireshark 1.4.2
Description: Buffer overflow in the sect_enttec_dmx_da function in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression.
Family: windows Class: vulnerability
Reference(s): CVE-2010-4538
Version: 6
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Wireshark
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21259
 
Oval ID: oval:org.mitre.oval:def:21259
Title: RHSA-2011:0013: wireshark security update (Moderate)
Description: Buffer overflow in the sect_enttec_dmx_da function in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression.
Family: unix Class: patch
Reference(s): RHSA-2011:0013-02
CVE-2010-4538
Version: 4
Platform(s): Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 5
Product(s): wireshark
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22926
 
Oval ID: oval:org.mitre.oval:def:22926
Title: DEPRECATED: ELSA-2011:0013: wireshark security update (Moderate)
Description: Buffer overflow in the sect_enttec_dmx_da function in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression.
Family: unix Class: patch
Reference(s): ELSA-2011:0013-02
CVE-2010-4538
Version: 7
Platform(s): Oracle Linux 6
Oracle Linux 5
Product(s): wireshark
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23063
 
Oval ID: oval:org.mitre.oval:def:23063
Title: ELSA-2011:0013: wireshark security update (Moderate)
Description: Buffer overflow in the sect_enttec_dmx_da function in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression.
Family: unix Class: patch
Reference(s): ELSA-2011:0013-02
CVE-2010-4538
Version: 6
Platform(s): Oracle Linux 6
Oracle Linux 5
Product(s): wireshark
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2012-07-30 Name : CentOS Update for wireshark CESA-2011:0013 centos4 x86_64
File : nvt/gb_CESA-2011_0013_wireshark_centos4_x86_64.nasl
2012-02-12 Name : Gentoo Security Advisory GLSA 201110-02 (wireshark)
File : nvt/glsa_201110_02.nasl
2011-03-07 Name : Debian Security Advisory DSA 2144-1 (wireshark)
File : nvt/deb_2144_1.nasl
2011-01-31 Name : CentOS Update for wireshark CESA-2011:0013 centos4 i386
File : nvt/gb_CESA-2011_0013_wireshark_centos4_i386.nasl
2011-01-27 Name : Wireshark ENTTEC DMX Data RLE Buffer Overflow Vulnerability (Win)
File : nvt/gb_wireshark_enttec_dmx_data_rle_bof_vuln_win.nasl
2011-01-14 Name : RedHat Update for wireshark RHSA-2011:0013-01
File : nvt/gb_RHSA-2011_0013-01_wireshark.nasl
2011-01-14 Name : Fedora Update for wireshark FEDORA-2011-0128
File : nvt/gb_fedora_2011_0128_wireshark_fc14.nasl
2011-01-14 Name : Fedora Update for wireshark FEDORA-2011-0167
File : nvt/gb_fedora_2011_0167_wireshark_fc13.nasl
2011-01-11 Name : Mandriva Update for wireshark MDVSA-2011:002 (wireshark)
File : nvt/gb_mandriva_MDVSA_2011_002.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
70244 Wireshark ENTTEC Dissector epan/dissectors/packet-enttec.c dissect_enttec_dmx...

Wireshark is prone to an overflow condition. The the 'dissect_enttec_dmx_data()' function fails to properly sanitize user-supplied input resulting in a buffer overflow. With a specially crafted packet sent to UDP port 3333, a remote attacker can potentially execute arbitrary code.

Snort® IPS/IDS

Date Description
2017-08-23 Wireshark ENTTEC DMX RLE buffer overflow attempt
RuleID : 43602 - Revision : 3 - Type : SERVER-OTHER
2017-08-23 Wireshark ENTTEC DMX RLE buffer overflow attempt
RuleID : 43601 - Revision : 2 - Type : FILE-OTHER
2017-08-23 Wireshark ENTTEC DMX RLE buffer overflow attempt
RuleID : 43600 - Revision : 2 - Type : FILE-OTHER

Nessus® Vulnerability Scanner

Date Description
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2011-0013.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20110110_wireshark_on_SL4_x.nasl - Type : ACT_GATHER_INFO
2011-10-10 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201110-02.nasl - Type : ACT_GATHER_INFO
2011-04-07 Name : The remote SuSE 11 host is missing a security update.
File : suse_11_wireshark-110331.nasl - Type : ACT_GATHER_INFO
2011-01-28 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2011-0013.nasl - Type : ACT_GATHER_INFO
2011-01-28 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2011-002.nasl - Type : ACT_GATHER_INFO
2011-01-17 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2144.nasl - Type : ACT_GATHER_INFO
2011-01-14 Name : The remote Fedora host is missing a security update.
File : fedora_2011-0128.nasl - Type : ACT_GATHER_INFO
2011-01-14 Name : The remote Fedora host is missing a security update.
File : fedora_2011-0167.nasl - Type : ACT_GATHER_INFO
2011-01-12 Name : The remote Windows host contains an application that is affected by multiple ...
File : wireshark_1_4_3.nasl - Type : ACT_GATHER_INFO
2011-01-11 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-0013.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:41:59
  • Multiple Updates