https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5133
Summary: Wireshark vulnerable to DLL hijacking
Product: Wireshark
Version: SVN
Platform: x86
OS/Version: Windows 7
Status: NEW
Severity: Blocker
Priority: Low
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: gerald@xxxxxxxxxxxxx
Created an attachment (id=5085)
--> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=5085)
Fake 32-bit airpcap.dll compiled from PoC code.
Build Information:
Version 1.4.0rc3-33899
Copyright 1998-2010 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled with GTK+ 2.16.6, (32-bit) with GLib 2.22.4, with WinPcap (version
unknown), with libz 1.2.3, without POSIX capabilities, without libpcre, with
SMI
0.4.8, with c-ares 1.7.1, with Lua 5.1, without Python, with GnuTLS 2.8.5, with
Gcrypt 1.4.5, with MIT Kerberos, with GeoIP, with PortAudio V19-devel (built
Aug
23 2010), with AirPcap.
Running on Windows XP Service Pack 3, build 2600, with WinPcap version 4.1.2
(packet.dll version 4.1.0.2001), based on libpcap version 1.0 branch 1_0_rel0b
(20091008), GnuTLS 2.8.5, Gcrypt 1.4.5, without AirPcap.
Built using Microsoft Visual C++ 9.0 build 30729
Wireshark is Open Source Software released under the GNU General Public
License.
Check the man page and http://www.wireshark.org for more information.
--
Wireshark is one of the applications vulnerable to the DLL hijacking exploit
recently publicized by HD Moore:
http://blog.metasploit.com/2010/08/exploiting-dll-hijacking-flaws.html
A proof of concept is available at
http://www.exploit-db.com/exploits/14721/
All current versions of Wireshark are vulnerable.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.