ID CVE-2014-6432
Summary The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
References
Vulnerable Configurations
  • Wireshark 1.10.0
    cpe:2.3:a:wireshark:wireshark:1.10.0
  • Wireshark Wireshark 1.10.1
    cpe:2.3:a:wireshark:wireshark:1.10.1
  • Wireshark Wireshark 1.10.2
    cpe:2.3:a:wireshark:wireshark:1.10.2
  • Wireshark 1.10.3
    cpe:2.3:a:wireshark:wireshark:1.10.3
  • Wireshark 1.10.4
    cpe:2.3:a:wireshark:wireshark:1.10.4
  • Wireshark 1.10.5
    cpe:2.3:a:wireshark:wireshark:1.10.5
  • Wireshark 1.10.6
    cpe:2.3:a:wireshark:wireshark:1.10.6
  • Wireshark 1.10.7
    cpe:2.3:a:wireshark:wireshark:1.10.7
  • Wireshark 1.10.8
    cpe:2.3:a:wireshark:wireshark:1.10.8
  • Wireshark 1.10.9
    cpe:2.3:a:wireshark:wireshark:1.10.9
  • Wireshark 1.12.0
    cpe:2.3:a:wireshark:wireshark:1.12.0
CVSS
Base: 5.0 (as of 21-09-2014 - 20:41)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_WIRESHARK-140923.NASL
    description The wireshark package was upgraded to 1.10.10 from 1.8.x as 1.8 was discontinued. This update fixes vulnerabilities that could allow an attacker to crash Wireshark or make it become unresponsive by sending specific packets onto the network or have them loaded via a capture file while the dissectors are running. It also contains a number of other bug fixes. - RTP dissector crash. (wnpa-sec-2014-12 CVE-2014-6421 / CVE-2014-6422) - MEGACO dissector infinite loop. (wnpa-sec-2014-13 CVE-2014-6423) - Netflow dissector crash. (wnpa-sec-2014-14 CVE-2014-6424) - RTSP dissector crash. (wnpa-sec-2014-17 CVE-2014-6427) - SES dissector crash. (wnpa-sec-2014-18 CVE-2014-6428) - Sniffer file parser crash. (wnpa-sec-2014-19 CVE-2014-6429 / CVE-2014-6430 / CVE-2014-6431 / CVE-2014-6432) - The Catapult DCT2000 and IrDA dissectors could underrun a buffer. (wnpa-sec-2014-08 CVE-2014-5161 / CVE-2014-5162, bnc#889901) - The GSM Management dissector could crash. (wnpa-sec-2014-09 CVE-2014-5163, bnc#889906) - The RLC dissector could crash. (wnpa-sec-2014-10 CVE-2014-5164, bnc#889900) - The ASN.1 BER dissector could crash. (wnpa-sec-2014-11 CVE-2014-5165, bnc#889899) Further bug fixes as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.10.1 0.html and https://www.wireshark.org/docs/relnotes/wireshark-1.10.9 .html .
    last seen 2019-02-21
    modified 2014-11-21
    plugin id 77960
    published 2014-09-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=77960
    title SuSE 11.3 Security Update : wireshark (SAT Patch Number 9745)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2014-566.NASL
    description Wireshark was update to 1.10.10 [bnc#897055] On openSUSE 12.3, the package was upgraded to 1.10.x from 1.8.x as it was discontinued. This update fixes vulnerabilities in Wireshark that could allow an attacker to crash Wireshark or make it become unresponsive by sending specific packages onto the network or have it loaded via a capture file while the dissectors are running. It also contains a number of other bug fixes. - RTP dissector crash wnpa-sec-2014-12 CVE-2014-6421 CVE-2014-6422 - MEGACO dissector infinite loop wnpa-sec-2014-13 CVE-2014-6423 - Netflow dissector crash wnpa-sec-2014-14 CVE-2014-6424 - RTSP dissector crash wnpa-sec-2014-17 CVE-2014-6427 - SES dissector crash wnpa-sec-2014-18 CVE-2014-6428 - Sniffer file parser crash wnpa-sec-2014-19 CVE-2014-6429 CVE-2014-6430 CVE-2014-6431 CVE-2014-6432 - Further bug fixes as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.10.1 0.html - includes changes from 1.10.9: fixes several crashes triggered by malformed protocol packages - vulnerabilities fixed : - The Catapult DCT2000 and IrDA dissectors could underrun a buffer wnpa-sec-2014-08 CVE-2014-5161 CVE-2014-5162 (bnc#889901) - The GSM Management dissector could crash wnpa-sec-2014-09 CVE-2014-5163 (bnc#889906) - The RLC dissector could crash wnpa-sec-2014-10 CVE-2014-5164 (bnc#889900) - The ASN.1 BER dissector could crash wnpa-sec-2014-11 CVE-2014-5165 (bnc#889899) - Further bug fixes as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.10.9 .html
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 78021
    published 2014-10-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=78021
    title openSUSE Security Update : wireshark (openSUSE-SU-2014:1249-1)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-198.NASL
    description The following vulnerabilities were discovered in the Squeeze's Wireshark version : CVE-2015-2188 The WCP dissector could crash CVE-2015-0564 Wireshark could crash while decypting TLS/SSL sessions CVE-2015-0562 The DEC DNA Routing Protocol dissector could crash CVE-2014-8714 TN5250 infinite loops CVE-2014-8713 NCP crashes CVE-2014-8712 NCP crashes CVE-2014-8711 AMQP crash CVE-2014-8710 SigComp UDVM buffer overflow CVE-2014-6432 Sniffer file parser crash CVE-2014-6431 Sniffer file parser crash CVE-2014-6430 Sniffer file parser crash CVE-2014-6429 Sniffer file parser crash CVE-2014-6428 SES dissector crash CVE-2014-6423 MEGACO dissector infinite loop CVE-2014-6422 RTP dissector crash Since back-porting upstream patches to 1.2.11-6+squeeze15 did not fix all the outstanding issues and some issues are not even tracked publicly the LTS Team decided to sync squeeze-lts's wireshark package with wheezy-security to provide the best possible security support. Note that upgrading Wireshark from 1.2.x to 1.8.x introduces several backward-incompatible changes in package structure, shared library API/ABI, availability of dissectors and in syntax of command line parameters. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-06
    plugin id 83002
    published 2015-04-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83002
    title Debian DLA-198-1 : wireshark security update
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201412-52.NASL
    description The remote host is affected by the vulnerability described in GLSA-201412-52 (Wireshark: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Wireshark. Please review the CVE identifiers referenced below for details. Impact : A remote attacker can cause a Denial of Service condition via specially crafted packets. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2015-04-13
    plugin id 80273
    published 2014-12-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80273
    title GLSA-201412-52 : Wireshark: Multiple vulnerabilities
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2014-188.NASL
    description Updated wireshark packages fix security vulnerabilities : RTP dissector crash (CVE-2014-6421, CVE-2014-6422). MEGACO dissector infinite loop (CVE-2014-6423). Netflow dissector crash (CVE-2014-6424). RTSP dissector crash (CVE-2014-6427). SES dissector crash (CVE-2014-6428). Sniffer file parser crash (CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432).
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 77888
    published 2014-09-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=77888
    title Mandriva Linux Security Advisory : wireshark (MDVSA-2014:188)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2014-446.NASL
    description Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2014-6429 , CVE-2014-6430 , CVE-2014-6431 , CVE-2014-6432) Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2014-6421 , CVE-2014-6422 , CVE-2014-6423 , CVE-2014-6424 , CVE-2014-6425 , CVE-2014-6426 , CVE-2014-6427 , CVE-2014-6428)
    last seen 2019-02-21
    modified 2018-04-18
    plugin id 79295
    published 2014-11-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=79295
    title Amazon Linux AMI : wireshark (ALAS-2014-446)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2014-12362.NASL
    description Ver. 1.12.1 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-19
    plugin id 78381
    published 2014-10-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=78381
    title Fedora 21 : wireshark-1.12.1-1.fc21 (2014-12362)
  • NASL family Windows
    NASL id WIRESHARK_1_10_10.NASL
    description The installed version of Wireshark is version 1.10.x prior to 1.10.10. It is, therefore, affected by the following vulnerabilities : - Errors exist in the following dissectors that can cause the application to crash : - MEGACO (CVE-2014-6423) - Netflow (CVE-2014-6424) - RTP (CVE-2014-6421, CVE-2014-6422) - RTSP (CVE-2014-6427) - SES (CVE-2014-6428) - Unspecified errors exist related to file parsing that can cause the parser to crash. (CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 77731
    published 2014-09-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=77731
    title Wireshark 1.10.x < 1.10.10 Multiple DoS Vulnerabilities
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20141021_WIRESHARK_ON_SL6_X.NASL
    description Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432) Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2014-6421, CVE-2014-6422, CVE-2014-6423, CVE-2014-6424, CVE-2014-6425, CVE-2014-6426, CVE-2014-6427, CVE-2014-6428) All running instances of Wireshark must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-12-28
    plugin id 78649
    published 2014-10-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=78649
    title Scientific Linux Security Update : wireshark on SL6.x, SL7.x i386/x86_64
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2014-1677.NASL
    description From Red Hat Security Advisory 2014:1677 : Updated wireshark packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432) Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2014-6421, CVE-2014-6422, CVE-2014-6423, CVE-2014-6425, CVE-2014-6428) All wireshark users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running instances of Wireshark must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 78640
    published 2014-10-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=78640
    title Oracle Linux 5 : wireshark (ELSA-2014-1677)
  • NASL family Windows
    NASL id WIRESHARK_1_12_1.NASL
    description The installed version of Wireshark is version 1.12.x prior to 1.12.1. It is, therefore, affected by the following vulnerabilities : - Errors exist in the following dissectors that can cause the application to crash : - CUPS (CVE-2014-6425) - HIP (CVE-2014-6426) - MEGACO (CVE-2014-6423) - Netflow (CVE-2014-6424) - RTSP (CVE-2014-6427) - SES (CVE-2014-6428) - Unspecified errors exist related to file parsing that can cause the parser to crash. (CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2014-11-21
    plugin id 77732
    published 2014-09-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=77732
    title Wireshark 1.12.x < 1.12.1 Multiple DoS Vulnerabilities
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2014-1677.NASL
    description Updated wireshark packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432) Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2014-6421, CVE-2014-6422, CVE-2014-6423, CVE-2014-6425, CVE-2014-6428) All wireshark users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running instances of Wireshark must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-12-14
    plugin id 78621
    published 2014-10-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=78621
    title RHEL 5 : wireshark (RHSA-2014:1677)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2014-1677.NASL
    description Updated wireshark packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432) Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2014-6421, CVE-2014-6422, CVE-2014-6423, CVE-2014-6425, CVE-2014-6428) All wireshark users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running instances of Wireshark must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 78609
    published 2014-10-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=78609
    title CentOS 5 : wireshark (CESA-2014:1677)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS11_WIRESHARK_20141120.NASL
    description The remote Solaris system is missing necessary patches to address security updates : - Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors. (CVE-2014-6421) - The SDP dissector in Wireshark 1.10.x before 1.10.10 creates duplicate hashtables for a media channel, which allows remote attackers to cause a denial of service (application crash) via a crafted packet to the RTP dissector. (CVE-2014-6422) - The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line. (CVE-2014-6423) - The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet. (CVE-2014-6424) - The (1) get_quoted_string and (2) get_unquoted_string functions in epan/ dissectors/packet-cups.c in the CUPS dissector in Wireshark 1.12.x before 1.12.1 allow remote attackers to cause a denial of service (buffer over-read and application crash) via a CUPS packet that lacks a trailing '\0' character. (CVE-2014-6425) - The dissect_hip_tlv function in epan/dissectors/packet-hip.c in the HIP dissector in Wireshark 1.12.x before 1.12.1 does not properly handle a NULL tree, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet. (CVE-2014-6426) - Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/ packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position. (CVE-2014-6427) - The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. (CVE-2014-6428) - The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file. (CVE-2014-6429) - The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file. (CVE-2014-6430) - Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer. (CVE-2014-6431) - The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file. (CVE-2014-6432)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 80816
    published 2015-01-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80816
    title Oracle Solaris Third-Party Patch Update : wireshark (multiple_vulnerabilities_in_wireshark11)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2014-1676.NASL
    description Updated wireshark packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432) Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2014-6421, CVE-2014-6422, CVE-2014-6423, CVE-2014-6424, CVE-2014-6425, CVE-2014-6426, CVE-2014-6427, CVE-2014-6428) All wireshark users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running instances of Wireshark must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 78608
    published 2014-10-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=78608
    title CentOS 6 / 7 : wireshark (CESA-2014:1676)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-3049.NASL
    description Multiple vulnerabilities were discovered in the dissectors/parsers for RTP, MEGACO, Netflow, RTSP, SES and Sniffer, which could result in denial of service.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 78449
    published 2014-10-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=78449
    title Debian DSA-3049-1 : wireshark - security update
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2014-1676.NASL
    description From Red Hat Security Advisory 2014:1676 : Updated wireshark packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432) Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2014-6421, CVE-2014-6422, CVE-2014-6423, CVE-2014-6424, CVE-2014-6425, CVE-2014-6426, CVE-2014-6427, CVE-2014-6428) All wireshark users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running instances of Wireshark must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 78619
    published 2014-10-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=78619
    title Oracle Linux 6 / 7 : wireshark (ELSA-2014-1676)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2014-11441.NASL
    description Ver. 1.10.10, Security fix for CVE-2014-6430, CVE-2014-6423, CVE-2014-6424, CVE-2014-6432, CVE-2014-6431, CVE-2014-6427, CVE-2014-6428, CVE-2014-6429, CVE-2014-6421, CVE-2014-6422 fix decode Camellia encryption for Kerberos 5 fix decode elliptic curves in DTLS Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-19
    plugin id 77875
    published 2014-09-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=77875
    title Fedora 20 : wireshark-1.10.10-1.fc20 (2014-11441)
  • NASL family F5 Networks Local Security Checks
    NASL id F5_BIGIP_SOL16940.NASL
    description CVE-2014-6423 The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line./ CVE-2014-6425 The (1) get_quoted_string and (2) get_unquoted_string functions in epan/dissectors/packet-cups.c in the CUPS dissector in Wireshark 1.12.x before 1.12.1 allow remote attackers to cause a denial of service (buffer over-read and application crash) via a CUPS packet that lacks a trailing '\0' character. CVE-2014-6428 The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. CVE-2014-6429 The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file. CVE-2014-6430 The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file. CVE-2014-6431 Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer. CVE-2014-6432 The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    last seen 2019-02-21
    modified 2019-01-04
    plugin id 84627
    published 2015-07-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=84627
    title F5 Networks BIG-IP : Multiple Wireshark vulnerabilities (K16940)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2014-1676.NASL
    description Updated wireshark packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432) Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2014-6421, CVE-2014-6422, CVE-2014-6423, CVE-2014-6424, CVE-2014-6425, CVE-2014-6426, CVE-2014-6427, CVE-2014-6428) All wireshark users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running instances of Wireshark must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 78620
    published 2014-10-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=78620
    title RHEL 6 / 7 : wireshark (RHSA-2014:1676)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20141021_WIRESHARK_ON_SL5_X.NASL
    description Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432) Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2014-6421, CVE-2014-6422, CVE-2014-6423, CVE-2014-6425, CVE-2014-6428) All running instances of Wireshark must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-12-28
    plugin id 78648
    published 2014-10-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=78648
    title Scientific Linux Security Update : wireshark on SL5.x i386/x86_64
redhat via4
advisories
  • bugzilla
    id 1142611
    title CVE-2014-6421 CVE-2014-6422 wireshark: RTP dissector crash (wnpa-sec-2014-12)
    oval
    OR
    • AND
      • OR
        • comment Red Hat Enterprise Linux 7 Client is installed
          oval oval:com.redhat.rhsa:tst:20140675001
        • comment Red Hat Enterprise Linux 7 Server is installed
          oval oval:com.redhat.rhsa:tst:20140675002
        • comment Red Hat Enterprise Linux 7 Workstation is installed
          oval oval:com.redhat.rhsa:tst:20140675003
        • comment Red Hat Enterprise Linux 7 ComputeNode is installed
          oval oval:com.redhat.rhsa:tst:20140675004
      • OR
        • AND
          • comment wireshark is earlier than 0:1.10.3-12.el7_0
            oval oval:com.redhat.rhsa:tst:20141676005
          • comment wireshark is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100924006
        • AND
          • comment wireshark-devel is earlier than 0:1.10.3-12.el7_0
            oval oval:com.redhat.rhsa:tst:20141676007
          • comment wireshark-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100924010
        • AND
          • comment wireshark-gnome is earlier than 0:1.10.3-12.el7_0
            oval oval:com.redhat.rhsa:tst:20141676009
          • comment wireshark-gnome is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100924008
    • AND
      • OR
        • comment Red Hat Enterprise Linux 6 Client is installed
          oval oval:com.redhat.rhsa:tst:20100842001
        • comment Red Hat Enterprise Linux 6 Server is installed
          oval oval:com.redhat.rhsa:tst:20100842002
        • comment Red Hat Enterprise Linux 6 Workstation is installed
          oval oval:com.redhat.rhsa:tst:20100842003
        • comment Red Hat Enterprise Linux 6 ComputeNode is installed
          oval oval:com.redhat.rhsa:tst:20100842004
      • OR
        • AND
          • comment wireshark is earlier than 0:1.8.10-8.el6_6
            oval oval:com.redhat.rhsa:tst:20141676015
          • comment wireshark is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100924006
        • AND
          • comment wireshark-devel is earlier than 0:1.8.10-8.el6_6
            oval oval:com.redhat.rhsa:tst:20141676017
          • comment wireshark-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100924010
        • AND
          • comment wireshark-gnome is earlier than 0:1.8.10-8.el6_6
            oval oval:com.redhat.rhsa:tst:20141676016
          • comment wireshark-gnome is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100924008
    rhsa
    id RHSA-2014:1676
    released 2014-10-21
    severity Moderate
    title RHSA-2014:1676: wireshark security update (Moderate)
  • bugzilla
    id 1142611
    title CVE-2014-6421 CVE-2014-6422 wireshark: RTP dissector crash (wnpa-sec-2014-12)
    oval
    AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhsa:tst:20070055001
    • OR
      • AND
        • comment wireshark is earlier than 0:1.0.15-7.el5_11
          oval oval:com.redhat.rhsa:tst:20141677002
        • comment wireshark is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070066011
      • AND
        • comment wireshark-gnome is earlier than 0:1.0.15-7.el5_11
          oval oval:com.redhat.rhsa:tst:20141677004
        • comment wireshark-gnome is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070066013
    rhsa
    id RHSA-2014:1677
    released 2014-10-21
    severity Moderate
    title RHSA-2014:1677: wireshark security update (Moderate)
rpms
  • wireshark-0:1.10.3-12.el7_0
  • wireshark-devel-0:1.10.3-12.el7_0
  • wireshark-gnome-0:1.10.3-12.el7_0
  • wireshark-0:1.8.10-8.el6_6
  • wireshark-devel-0:1.8.10-8.el6_6
  • wireshark-gnome-0:1.8.10-8.el6_6
  • wireshark-0:1.0.15-7.el5_11
  • wireshark-gnome-0:1.0.15-7.el5_11
refmap via4
confirm
debian DSA-3049
secunia
  • 60280
  • 60578
  • 61929
  • 61933
suse
  • SUSE-SU-2014:1221
  • openSUSE-SU-2014:1249
Last major update 05-11-2014 - 03:28
Published 20-09-2014 - 06:55
Back to Top