ID CVE-2014-6432
Summary The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
References
Vulnerable Configurations
  • cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.10.3:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.10.3:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.10.4:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.10.4:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.10.5:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.10.5:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.10.6:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.10.6:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.10.7:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.10.7:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.10.8:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.10.8:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.10.9:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.10.9:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 05-11-2014 - 08:28)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
redhat via4
advisories
  • bugzilla
    id 1142611
    title CVE-2014-6421 CVE-2014-6422 wireshark: RTP dissector crash (wnpa-sec-2014-12)
    oval
    OR
    • AND
      • OR
        • comment Red Hat Enterprise Linux 7 Client is installed
          oval oval:com.redhat.rhba:tst:20150364001
        • comment Red Hat Enterprise Linux 7 Server is installed
          oval oval:com.redhat.rhba:tst:20150364002
        • comment Red Hat Enterprise Linux 7 Workstation is installed
          oval oval:com.redhat.rhba:tst:20150364003
        • comment Red Hat Enterprise Linux 7 ComputeNode is installed
          oval oval:com.redhat.rhba:tst:20150364004
      • OR
        • AND
          • comment wireshark is earlier than 0:1.10.3-12.el7_0
            oval oval:com.redhat.rhsa:tst:20141676005
          • comment wireshark is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100924006
        • AND
          • comment wireshark-devel is earlier than 0:1.10.3-12.el7_0
            oval oval:com.redhat.rhsa:tst:20141676007
          • comment wireshark-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100924010
        • AND
          • comment wireshark-gnome is earlier than 0:1.10.3-12.el7_0
            oval oval:com.redhat.rhsa:tst:20141676009
          • comment wireshark-gnome is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100924008
    • AND
      • OR
        • comment Red Hat Enterprise Linux 6 Client is installed
          oval oval:com.redhat.rhba:tst:20111656001
        • comment Red Hat Enterprise Linux 6 Server is installed
          oval oval:com.redhat.rhba:tst:20111656002
        • comment Red Hat Enterprise Linux 6 Workstation is installed
          oval oval:com.redhat.rhba:tst:20111656003
        • comment Red Hat Enterprise Linux 6 ComputeNode is installed
          oval oval:com.redhat.rhba:tst:20111656004
      • OR
        • AND
          • comment wireshark is earlier than 0:1.8.10-8.el6_6
            oval oval:com.redhat.rhsa:tst:20141676015
          • comment wireshark is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100924006
        • AND
          • comment wireshark-devel is earlier than 0:1.8.10-8.el6_6
            oval oval:com.redhat.rhsa:tst:20141676017
          • comment wireshark-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100924010
        • AND
          • comment wireshark-gnome is earlier than 0:1.8.10-8.el6_6
            oval oval:com.redhat.rhsa:tst:20141676016
          • comment wireshark-gnome is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100924008
    rhsa
    id RHSA-2014:1676
    released 2014-10-21
    severity Moderate
    title RHSA-2014:1676: wireshark security update (Moderate)
  • bugzilla
    id 1142611
    title CVE-2014-6421 CVE-2014-6422 wireshark: RTP dissector crash (wnpa-sec-2014-12)
    oval
    AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331001
    • OR
      • AND
        • comment wireshark is earlier than 0:1.0.15-7.el5_11
          oval oval:com.redhat.rhsa:tst:20141677002
        • comment wireshark is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070066011
      • AND
        • comment wireshark-gnome is earlier than 0:1.0.15-7.el5_11
          oval oval:com.redhat.rhsa:tst:20141677004
        • comment wireshark-gnome is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070066013
    rhsa
    id RHSA-2014:1677
    released 2014-10-21
    severity Moderate
    title RHSA-2014:1677: wireshark security update (Moderate)
rpms
  • wireshark-0:1.10.3-12.el7_0
  • wireshark-devel-0:1.10.3-12.el7_0
  • wireshark-gnome-0:1.10.3-12.el7_0
  • wireshark-0:1.8.10-8.el6_6
  • wireshark-devel-0:1.8.10-8.el6_6
  • wireshark-gnome-0:1.8.10-8.el6_6
  • wireshark-0:1.0.15-7.el5_11
  • wireshark-gnome-0:1.0.15-7.el5_11
refmap via4
confirm
debian DSA-3049
secunia
  • 60280
  • 60578
  • 61929
  • 61933
suse
  • SUSE-SU-2014:1221
  • openSUSE-SU-2014:1249
Last major update 05-11-2014 - 08:28
Published 20-09-2014 - 10:55
Back to Top