[ASA-202103-2] wireshark-qt: arbitrary code execution
foxboron at archlinux.org
Sat Mar 20 12:14:16 UTC 2021
Arch Linux Security Advisory ASA-202103-2
Date : 2021-03-13
CVE-ID : CVE-2021-22191
Package : wireshark-qt
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-1669
The package wireshark-qt before version 3.4.4-1 is vulnerable to
arbitrary code execution.
Upgrade to 3.4.4-1.
# pacman -Syu "wireshark-qt>=3.4.4-1"
The problem has been fixed upstream in version 3.4.4.
A security issue has been found in Wireshark before version 3.4.4. Some
fields in the Wireshark proto_tree are double-clickable and pass URLs
with arbitrary schemes to the QDesktopServices::openUrl function. http
and https URLs passed to this function are opened by the browser which
is generally safe. For some other schemes like dav and file however,
referenced files will be opened by the system's standard application
associated with their file type. By preparing internet-hosted file
shares and executable files, arbitrary code execution can be achieved
via malicious pcap(ng) files or captured live-traffic and some user
A remote attacker might be able to execute arbitrary code via a crafted
network packet, or a crafted packet trace file.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: not available
More information about the arch-security