9.3
CVSSv2

CVE-2010-4538

Published: 07/01/2011 Updated: 19/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the sect_enttec_dmx_da function in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression.

Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark 1.4.2

Vendor Advisories

It was discovered that a buffer overflow in the ENTTEC dissector may lead to the execution of arbitrary code For the stable distribution (lenny), this problem has been fixed in version 102-3+lenny12 For the testing distribution (squeeze), this problem has been fixed in version 1211-6 For the unstable distribution (sid), this problem has been ...
Debian Bug report logs - #608990 CVE-2010-4538: ENTTEC dissector Package: wireshark; Maintainer for wireshark is Balint Reczey <rbalint@ubuntucom>; Source for wireshark is src:wireshark (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <muehlenhoff@univentionde> Date: Wed, 5 Jan 2011 09:21:02 UTC Severity: gr ...
Debian Bug report logs - #776135 wireshark: Multiple security issues in 1122 and prior versions Package: wireshark; Maintainer for wireshark is Balint Reczey <rbalint@ubuntucom>; Source for wireshark is src:wireshark (PTS, buildd, popcon) Reported by: balint@balintreczeyhu Date: Sat, 24 Jan 2015 10:51:01 UTC Severity: ...
Debian Bug report logs - #780372 CVE-2015-2187 CVE-2015-2188 CVE-2015-2189 CVE-2015-2190 CVE-2015-2191 CVE-2015-2192 Package: wireshark; Maintainer for wireshark is Balint Reczey <rbalint@ubuntucom>; Source for wireshark is src:wireshark (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Th ...

Exploits

# source: wwwsecurityfocuscom/bid/45634/info #!/usr/bin/env python # Wireshark ENTTEC DMX Data (UDP) Buffer Overflow PoC # by non-customers crew in 2010 # rock-madridcom/ import socket, sys try: host = sysargv[1] except: print "usage: " + sysargv[0] + " <host>" sysexit(2) port = 3333 addr = (host, port) data = ...