CVE-2021-22191 - log back

CVE-2021-22191 edited at 13 Mar 2021 20:48:40
Severity
- Low
+ Medium
CVE-2021-22191 edited at 11 Mar 2021 16:45:49
References
- https://www.wireshark.org/lists/wireshark-announce/202103/msg00000.html
+ https://www.wireshark.org/security/wnpa-sec-2021-03.html
https://gitlab.com/wireshark/wireshark/-/issues/17232
https://gitlab.com/wireshark/wireshark/-/merge_requests/2074
https://gitlab.com/wireshark/wireshark/-/commit/b2c58d020c100958beb59d9e62471efab5c3cc2d
CVE-2021-22191 edited at 10 Mar 2021 21:58:05
Severity
- Unknown
+ Low
Remote
- Unknown
+ Remote
Type
- Unknown
+ Arbitrary code execution
Description
+ A security issue has been found in Wireshark before version 3.4.4. Some fields in the Wireshark proto_tree are double-clickable and pass URLs with arbitrary schemes to the QDesktopServices::openUrl function. http and https URLs passed to this function are opened by the browser which is generally safe. For some other schemes like dav and file however, referenced files will be opened by the system's standard application associated with their file type. By preparing internet-hosted file shares and executable files, arbitrary code execution can be achieved via malicious pcap(ng) files or captured live-traffic and some user interaction.
References
+ https://www.wireshark.org/lists/wireshark-announce/202103/msg00000.html
+ https://gitlab.com/wireshark/wireshark/-/issues/17232
+ https://gitlab.com/wireshark/wireshark/-/merge_requests/2074
+ https://gitlab.com/wireshark/wireshark/-/commit/b2c58d020c100958beb59d9e62471efab5c3cc2d
Notes
CVE-2021-22191 created at 10 Mar 2021 21:51:41