Untrusted search path vulnerability in Wireshark 0.8.4 through 1.0.15 and 1.2.0 through 1.2.10 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse airpcap.dll, and possibly other DLLs, that is located in the same folder as a file that automatically launches Wireshark.
Link | Tags |
---|---|
http://www.wireshark.org/security/wnpa-sec-2010-09.html | vendor advisory |
http://www.exploit-db.com/exploits/14721/ | exploit |
http://secunia.com/advisories/41064 | third party advisory vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11498 | vdb entry signature |
http://www.vupen.com/english/advisories/2010/2165 | vdb entry vendor advisory |
http://www.vupen.com/english/advisories/2010/2243 | vdb entry |
http://www.wireshark.org/security/wnpa-sec-2010-10.html | vendor advisory |