Access Restriction Bypass Affecting wireshark package, versions [,1.12.10)[2.0.0, 2.0.2)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-WIRESHARK-2318276
  • published14 Dec 2021
  • disclosed28 Feb 2016
  • creditUnknown

Introduced: 28 Feb 2016

CVE-2016-2521  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade wireshark to version 1.12.10, 2.0.2 or higher.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass. Untrusted search path vulnerability in the WiresharkApplication class in ui/qt/wireshark_application.cpp in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 on Windows allows local users to gain privileges via a Trojan horse riched20.dll.dll file in the current working directory, related to use of QLibrary.

References

CVSS Scores

version 3.1