Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-yrjq-d2yz-s7h1
Vulnerability ID VCID-yrjq-d2yz-s7h1
Aliases CVE-2010-4300
Summary Multiple vulnerabilities in Wireshark allow for the remote execution of arbitrary code, or a Denial of Service condition.
Status Published
Exploitability 2.0
Weighted Severity 6.8
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (2)
Reference id Reference type URL
http://blogs.sun.com/security/entry/buffer_overflow_vulnerability_in_wireshark
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://osvdb.org/69354
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4300.json
https://api.first.org/data/v1/epss?cve=CVE-2010-4300
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4300
http://secunia.com/advisories/42290
http://secunia.com/advisories/42411
http://secunia.com/advisories/42877
http://secunia.com/advisories/43068
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14287
http://www.exploit-db.com/exploits/15676
http://www.mandriva.com/security/advisories?name=MDVSA-2010:242
http://www.redhat.com/support/errata/RHSA-2010-0924.html
http://www.securityfocus.com/bid/44987
http://www.securitytracker.com/id?1024762
http://www.vupen.com/english/advisories/2010/3038
http://www.vupen.com/english/advisories/2010/3068
http://www.vupen.com/english/advisories/2010/3093
http://www.vupen.com/english/advisories/2011/0076
http://www.vupen.com/english/advisories/2011/0212
http://www.vupen.com/english/advisories/2011/0404
http://www.wireshark.org/security/wnpa-sec-2010-13.html
http://www.wireshark.org/security/wnpa-sec-2010-14.html
656456 https://bugzilla.redhat.com/show_bug.cgi?id=656456
cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.2.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*
CVE-2010-4300 https://nvd.nist.gov/vuln/detail/CVE-2010-4300
CVE-2010-4300;OSVDB-69354 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/15676.txt
CVE-2010-4300;OSVDB-69354 Exploit https://www.securityfocus.com/bid/44987/info
GLSA-201110-02 https://security.gentoo.org/glsa/201110-02
RHSA-2010:0924 https://access.redhat.com/errata/RHSA-2010:0924
Data source Exploit-DB
Date added Dec. 4, 2010
Description Wireshark - LDSS Dissector Buffer Overflow
Ransomware campaign use Known
Source publication date Dec. 4, 2010
Exploit type dos
Platform multiple
Source update date Nov. 12, 2016
Source URL https://www.securityfocus.com/bid/44987/info
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2010-4300
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.9308
EPSS Score 0.10159
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:01:11.196307+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/201110-02 38.0.0