Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mgcw-89jj-vw5f

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name. NOTE: some of these details are obtained from third party information.

Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name. NOTE: some of these details are obtained from third party information.

EPSS

Процентиль: 97%
0.34474
Средний

Дефекты

CWE-134

Связанные уязвимости

ubuntu
около 16 лет назад

Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name. NOTE: some of these details are obtained from third party information.

redhat
около 16 лет назад

Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name. NOTE: some of these details are obtained from third party information.

nvd
около 16 лет назад

Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name. NOTE: some of these details are obtained from third party information.

debian
около 16 лет назад

Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in ...

oracle-oval
около 16 лет назад

ELSA-2009-1100: wireshark security update (MODERATE)

EPSS

Процентиль: 97%
0.34474
Средний

Дефекты

CWE-134