CVE-2011-1591

Current Description

Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file.

Basic Data

PublishedApril 29, 2011
Last ModifiedSeptember 19, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-119
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score9.3
SeverityHIGH
Exploitability Score8.6
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationWiresharkWireshark1.4.0*******
    2.3ApplicationWiresharkWireshark1.4.1*******
    2.3ApplicationWiresharkWireshark1.4.2*******
    2.3ApplicationWiresharkWireshark1.4.3*******
    2.3ApplicationWiresharkWireshark1.4.4*******

Vulnerable Software List

VendorProductVersions
Wireshark Wireshark 1.4.0, 1.4.1, 1.4.2, 1.4.3, 1.4.4

References

NameSourceURLTags
FEDORA-2011-5621http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058900.htmlFEDORA
FEDORA-2011-5569http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058983.htmlFEDORA
FEDORA-2011-5529http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058993.htmlFEDORA
[oss-security] 20110418 Wireshark 1.2.16 / 1.4.5http://openwall.com/lists/oss-security/2011/04/18/2MLIST
[oss-security] 20110418 Re: Wireshark 1.2.16 / 1.4.5http://openwall.com/lists/oss-security/2011/04/18/8MLIST
44172http://secunia.com/advisories/44172SECUNIA
44374http://secunia.com/advisories/44374SECUNIA
1025389http://securitytracker.com/id?1025389SECTRACK
17185http://www.exploit-db.com/exploits/17185EXPLOIT-DBExploit
17195http://www.exploit-db.com/exploits/17195EXPLOIT-DB
VU#243670http://www.kb.cert.org/vuls/id/243670CERT-VNUS Government Resource
MDVSA-2011:083http://www.mandriva.com/security/advisories?name=MDVSA-2011:083MANDRIVA
71848http://www.osvdb.org/71848OSVDB
ADV-2011-1022http://www.vupen.com/english/advisories/2011/1022VUPENVendor Advisory
ADV-2011-1106http://www.vupen.com/english/advisories/2011/1106VUPEN
http://www.wireshark.org/security/wnpa-sec-2011-06.htmlhttp://www.wireshark.org/security/wnpa-sec-2011-06.htmlCONFIRM
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5836https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5836CONFIRMExploit
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5838https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5838CONFIRMExploit
wireshark-dect-bo(66834)https://exchange.xforce.ibmcloud.com/vulnerabilities/66834XF
oval:org.mitre.oval:def:15000https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15000OVAL