Vulnerability Details : CVE-2010-3133
Untrusted search path vulnerability in Wireshark 0.8.4 through 1.0.15 and 1.2.0 through 1.2.10 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse airpcap.dll, and possibly other DLLs, that is located in the same folder as a file that automatically launches Wireshark.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2010-3133
Probability of exploitation activity in the next 30 days: 1.81%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 87 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-3133
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
References for CVE-2010-3133
-
http://www.vupen.com/english/advisories/2010/2165
Webmail | OVH- OVHVendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11498
Repository / Oval Repository
-
http://www.vupen.com/english/advisories/2010/2243
Webmail | OVH- OVH
-
http://www.wireshark.org/security/wnpa-sec-2010-10.html
Wireshark · wnpa-sec-2010-10 · DLL hijacking vulnerability in WiresharkVendor Advisory
-
http://www.wireshark.org/security/wnpa-sec-2010-09.html
Wireshark · wnpa-sec-2010-09 · DLL hijacking vulnerability in WiresharkVendor Advisory
-
http://www.exploit-db.com/exploits/14721/
Wireshark 1.2.10 - 'airpcap.dll' DLL Hijacking - Windows local ExploitExploit
Products affected by CVE-2010-3133
- cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.9:*:*:*:*:*:*:*