7.5
CVSSv2

CVE-2010-0304

Published: 03/02/2010 Updated: 19/09/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 765
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple buffer overflows in the LWRES dissector in Wireshark 0.9.15 up to and including 1.0.10 and 1.2.0 up to and including 1.2.5 allow remote malicious users to cause a denial of service (crash) via a malformed packet, as demonstrated using a stack-based buffer overflow to the dissect_getaddrsbyname_request function.

Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark 1.0.9

wireshark wireshark 1.0.8

wireshark wireshark 1.0.0

wireshark wireshark 1.0

wireshark wireshark 1.2.5

wireshark wireshark 1.0.5

wireshark wireshark 1.0.4

wireshark wireshark 1.2.1

wireshark wireshark 1.2.2

wireshark wireshark 1.0.7

wireshark wireshark 1.0.6

wireshark wireshark 1.2

wireshark wireshark 1.2.0

wireshark wireshark 0.9.15

wireshark wireshark 1.0.10

wireshark wireshark 1.0.3

wireshark wireshark 1.0.2

wireshark wireshark 1.0.1

wireshark wireshark 1.2.3

wireshark wireshark 1.2.4

Vendor Advisories

Synopsis Moderate: wireshark security update Type/Severity Security Advisory: Moderate Topic Updated wireshark packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 3, 4, and 5The Red Hat Security Response Team has rated this update as having moderatesecurity impact Commo ...
Several remote vulnerabilities have been discovered in the Wireshark network traffic analyzer, which may lead to the execution of arbitrary code or denial of service The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-4377 A NULL pointer dereference was found in the SMB/SMB2 dissectors CVE-2010-0304 ...

Exploits

#!/usr/bin/env python # Wireshark 125 LWRES getaddrbyname stack-based buffer overflow PoC # with control over EIP on Debian 503 # by babi <bbbbaaaabbbbiiii@operamailcom> on 29 Jan 2010 # get it at wwwwiresharkorg/download/src/all-versions/wireshark-125targz import socket, sys try: host = sysargv[1] except: print "usa ...
## # $Id: wireshark_lwres_getaddrbyname_looprb 11126 2010-11-24 19:25:18Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## requir ...
## # $Id: wireshark_lwres_getaddrbynamerb 8454 2010-02-11 09:03:48Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'ms ...