Untrusted search path vulnerability in the Wireshark Application class in Wireshark via a Trojan horseID: oval:org.secpod.oval:def:33138 | Date: (C)2016-03-01 (M)2022-10-10 |
Class: VULNERABILITY | Family: macos |
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to an untrusted search path vulnerability. A flaw is present in the Wireshark Application class, which fails to handle a Trojan horse riched20.dll.dll file in the current working directory, related to use of QLibrary. Successful exploitation could allow local users to gain privileges.
Platform: |
Apple Mac OS 12 |
Apple Mac OS 11 |
Apple Mac OS X 10.15 |
Apple Mac OS X 10.14 |
Apple Mac OS X 10.12 |
Apple Mac OS X 10.13 |
Apple Mac OS X 10.9 |
Apple Mac OS X 10.11 |
Apple Mac OS X 10.10 |
Apple Mac OS X Server 10.9 |
Apple Mac OS X Server 10.11 |
Apple Mac OS X Server 10.10 |