CVE-2014-2282
Gentoo Linux Security Advisory 201406-33
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua.c in the M3UA dissector in Wireshark 1.10.x before 1.10.6 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted SS7 MTP3 packet.
La función dissect_protocol_data_parameter en epan/dissectors/packet-m3ua.c en el diseccionador de M3UA en Wireshark 1.10.x anterior a 1.10.6 no asigna debidamente memoria, lo que permite a atacantes remotos causar una denegación de servicio (caída de aplicación) a través de un paquete SS7 MTP3 manipulado.
Multiple vulnerabilities have been found in Wireshark, the worst of which allows remote attackers to execute arbitrary code. Versions less than 1.10.8 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-03-05 CVE Reserved
- 2014-03-11 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/57480 | Third Party Advisory | |
http://www.securitytracker.com/id/1029907 | Vdb Entry | |
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark10 | X_refsource_confirm | |
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9699 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2014-03/msg00046.html | 2016-04-04 | |
http://www.wireshark.org/security/wnpa-sec-2014-02.html | 2016-04-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 1.10.0 Search vendor "Wireshark" for product "Wireshark" and version "1.10.0" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 1.10.1 Search vendor "Wireshark" for product "Wireshark" and version "1.10.1" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 1.10.2 Search vendor "Wireshark" for product "Wireshark" and version "1.10.2" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 1.10.3 Search vendor "Wireshark" for product "Wireshark" and version "1.10.3" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 1.10.4 Search vendor "Wireshark" for product "Wireshark" and version "1.10.4" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 1.10.5 Search vendor "Wireshark" for product "Wireshark" and version "1.10.5" | - |
Affected
|