Vulnerabilities > CVE-2009-0601 - USE of Externally-Controlled Format String vulnerability in Wireshark

047910
CVSS 2.1 - LOW
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL

Summary

Format string vulnerability in Wireshark 0.99.8 through 1.0.5 on non-Windows platforms allows local users to cause a denial of service (application crash) via format string specifiers in the HOME environment variable. Per http://www.vupen.com/english/advisories/2009/0370: "Multiple vulnerabilities have been identified in Wireshark, which could be exploited by local or remote attackers to cause a denial of service or compromise a vulnerable system."

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Format String Injection
    An attacker includes formatting characters in a string input field on the target application. Most applications assume that users will provide static text and may respond unpredictably to the presence of formatting character. For example, in certain functions of the C programming languages such as printf, the formatting character %s will print the contents of a memory location expecting this location to identify a string and the formatting character %n prints the number of DWORD written in the memory. An attacker can use this to read or write to memory locations or files, or simply to manipulate the value of the resulting text in unexpected ways. Reading or writing memory may result in program crashes and writing memory could result in the execution of arbitrary code if the attacker can write to the program stack.
  • String Format Overflow in syslog()
    This attack targets the format string vulnerabilities in the syslog() function. An attacker would typically inject malicious input in the format string parameter of the syslog function. This is a common problem, and many public vulnerabilities and associated exploits have been posted.

Nessus

  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_F6F19735924549188A6087948EBB4907.NASL
    descriptionVendor reports : On non-Windows systems Wireshark could crash if the HOME environment variable contained sprintf-style string formatting characters. Wireshark could crash while reading a malformed NetScreen snoop file. Wireshark could crash while reading a Tektronix K12 text capture file.
    last seen2020-06-01
    modified2020-06-02
    plugin id35990
    published2009-03-23
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35990
    titleFreeBSD : wireshark -- multiple vulnerabilities (f6f19735-9245-4918-8a60-87948ebb4907)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_1_WIRESHARK-090218.NASL
    descriptionwireshark: fixed crashes while reading capture files containing NetScreen data (CVE-2009-0599), Tektronix K12 capture files (CVE-2009-0600) and and a format string vulnerability (CVE-2009-0601).
    last seen2020-06-01
    modified2020-06-02
    plugin id40322
    published2009-07-21
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/40322
    titleopenSUSE Security Update : wireshark (wireshark-539)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_WIRESHARK-6007.NASL
    descriptionwireshark: fixed crashes while reading capture files containing NetScreen data (CVE-2009-0599), Tektronix K12 capture files (CVE-2009-0600) and and a format string vulnerability (CVE-2009-0601).
    last seen2020-06-01
    modified2020-06-02
    plugin id35729
    published2009-02-23
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/35729
    titleopenSUSE 10 Security Update : wireshark (wireshark-6007)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2009-058.NASL
    descriptionBuffer overflow in wiretap/netscreen.c in Wireshark 0.99.7 through 1.0.5 allows user-assisted remote attackers to cause a denial of service (application crash) via a malformed NetScreen snoop file. (CVE-2009-0599) Wireshark 0.99.6 through 1.0.5 allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted Tektronix K12 text capture file, as demonstrated by a file with exactly one frame. (CVE-2009-0600) Format string vulnerability in Wireshark 0.99.8 through 1.0.5 on non-Windows platforms allows local users to cause a denial of service (application crash) via format string specifiers in the HOME environment variable. (CVE-2009-0601) This update provides Wireshark 1.0.6, which is not vulnerable to these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id37419
    published2009-04-23
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/37419
    titleMandriva Linux Security Advisory : wireshark (MDVSA-2009:058)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200906-05.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200906-05 (Wireshark: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Wireshark: David Maciejak discovered a vulnerability in packet-usb.c in the USB dissector via a malformed USB Request Block (URB) (CVE-2008-4680). Florent Drouin and David Maciejak reported an unspecified vulnerability in the Bluetooth RFCOMM dissector (CVE-2008-4681). A malformed Tamos CommView capture file (aka .ncf file) with an
    last seen2020-06-01
    modified2020-06-02
    plugin id39580
    published2009-07-01
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/39580
    titleGLSA-200906-05 : Wireshark: Multiple vulnerabilities
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_0_WIRESHARK-090218.NASL
    descriptionwireshark: fixed crashes while reading capture files containing NetScreen data (CVE-2009-0599), Tektronix K12 capture files (CVE-2009-0600) and and a format string vulnerability (CVE-2009-0601).
    last seen2020-06-01
    modified2020-06-02
    plugin id40153
    published2009-07-21
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/40153
    titleopenSUSE Security Update : wireshark (wireshark-539)

Statements

contributorTomas Hoger
lastmodified2009-02-17
organizationRed Hat
statementRed Hat does not consider this to be a security issue. For further details, see: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-0601#c3