ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 3388] New: [security] Format string vulnerability in the P

Date: Fri, 3 Apr 2009 02:11:50 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3388

           Summary: [security] Format string vulnerability in the
                    PROFINET/DCP (PN-DCP) dissector (CVE-2009-1210)
           Product: Wireshark
           Version: 1.0.6
          Platform: Other
        OS/Version: All
            Status: NEW
          Severity: Major
          Priority: High
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: pva@xxxxxxxxxx


Build Information:
Paste the COMPLETE build information from "Help->About Wireshark", "wireshark
-v", or "tshark -v".
--
I have not found any mention of this issue on wireshark.org website so I'm
opening this bug.

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1210

Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark
1.0.6 and earlier allows remote attackers to execute arbitrary code via a
PN-DCP packet with format string specifiers in the station name. NOTE: some of
these details are obtained from third party information.

Exploit: http://www.milw0rm.com/exploits/8308

Access Vector: Network exploitable
Access Complexity: Low
Authentication: Not required to exploit
Impact Type:Provides administrator access, Allows complete confidentiality,
integrity, and availability violation; Allows unauthorized disclosure of
information; Allows disruption of service


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.