CVE-2014-5164
Gentoo Linux Security Advisory 201409-01
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The rlc_decode_li function in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.10.x before 1.10.9 initializes a certain structure member only after this member is used, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
La función rlc_decode_li en epan/dissectors/packet-rlc.c en el diseccionados de RLC en Wireshark 1.10.x anterior a 1.10.9 inicializa cierto miembro de estructuras solamente después de que este miembro se haya utilizado, lo que permite a atacantes remotos causar una denegación de servicio (caída de la aplicación) a través de un paquete manipulado.
Multiple vulnerabilities have been discovered and corrected in wireshark. The updated packages have been upgraded to the 1.10.9 version where these security flaws have been fixed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-07-31 CVE Reserved
- 2014-08-01 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/57593 | Third Party Advisory | |
https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ba6eb5c72ffe82ca0e51c7083240975a5b118ad2 | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9795 | 2024-08-06 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 1.10.0 Search vendor "Wireshark" for product "Wireshark" and version "1.10.0" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 1.10.1 Search vendor "Wireshark" for product "Wireshark" and version "1.10.1" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 1.10.2 Search vendor "Wireshark" for product "Wireshark" and version "1.10.2" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 1.10.3 Search vendor "Wireshark" for product "Wireshark" and version "1.10.3" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 1.10.4 Search vendor "Wireshark" for product "Wireshark" and version "1.10.4" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 1.10.5 Search vendor "Wireshark" for product "Wireshark" and version "1.10.5" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 1.10.6 Search vendor "Wireshark" for product "Wireshark" and version "1.10.6" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 1.10.7 Search vendor "Wireshark" for product "Wireshark" and version "1.10.7" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 1.10.8 Search vendor "Wireshark" for product "Wireshark" and version "1.10.8" | - |
Affected
|