National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2009-0601 Detail

Description

Format string vulnerability in Wireshark 0.99.8 through 1.0.5 on non-Windows platforms allows local users to cause a denial of service (application crash) via format string specifiers in the HOME environment variable.

Source:  MITRE      Last Modified:  02/16/2009

Quick Info

CVE Dictionary Entry:
CVE-2009-0601
Original release date:
02/16/2009
Last revised:
03/07/2011
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
2.1 LOW
Vector:
(AV:L/AC:L/Au:N/C:N/I:N/A:P) (legend)
Impact Subscore:
2.9
Exploitability Subscore:
3.9
CVSS Version 2 Metrics:
Access Vector:
Locally exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows disruption of service

Evaluator Impact

Per http://www.vupen.com/english/advisories/2009/0370: "Multiple vulnerabilities have been identified in Wireshark, which could be exploited by local or remote attackers to cause a denial of service or compromise a vulnerable system."

Vendor Statements (disclaimer)

Official Statement from Red Hat (02/17/2009)

Red Hat does not consider this to be a security issue. For further details, see: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-0601#c3

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html External Source SUSE SUSE-SR:2009:005
http://wiki.rpath.com/Advisories:rPSA-2009-0040 External Source CONFIRM http://wiki.rpath.com/Advisories:rPSA-2009-0040
http://www.securityfocus.com/archive/1/archive/1/501763/100/0/threaded External Source BUGTRAQ 20090312 rPSA-2009-0040-1 tshark wireshark
http://www.securityfocus.com/bid/33690 Patch External Source BID 33690
http://www.securitytracker.com/id?1021697 External Source SECTRACK 1021697
http://www.vupen.com/english/advisories/2009/0370 External Source VUPEN ADV-2009-0370
http://www.wireshark.org/security/wnpa-sec-2009-01.html Vendor Advisory External Source CONFIRM http://www.wireshark.org/security/wnpa-sec-2009-01.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3150 External Source CONFIRM https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3150
https://issues.rpath.com/browse/RPL-2984 External Source CONFIRM https://issues.rpath.com/browse/RPL-2984

Technical Details

Vulnerability Type (View All)

  • Format String Vulnerability (CWE-134)

Change History 1 change record found - show changes