vendor:
Wireshark
by:
babi, Nullthreat & Pure|Hate
9,3
CVSS
HIGH
Stack-based buffer overflow
120
CWE
Product Name: Wireshark
Affected Version From: 1.2.5
Affected Version To: 1.2.5
Patch Exists: YES
Related CWE: CVE-2008-1563
CPE: a:wireshark:wireshark:1.2.5
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0890/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2008-1563/, https://www.rapid7.com/db/vulnerabilities/wireshark-cve-2008-1563/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2008-1563/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2008-1563/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Windows
2008
Wireshark 1.2.5 LWRES getaddrbyname stack-based buffer overflow
A stack-based buffer overflow vulnerability exists in Wireshark 1.2.5 due to improper bounds checking of the LWRES getaddrbyname request. An attacker can send a specially crafted LWRES getaddrbyname request to trigger a stack-based buffer overflow, resulting in arbitrary code execution.
Mitigation:
Upgrade to the latest version of Wireshark.