Vulnerability Details : CVE-2014-5161
The dissect_log function in plugins/irda/packet-irda.c in the IrDA dissector in Wireshark 1.10.x before 1.10.9 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet.
Vulnerability category: Denial of service
Products affected by CVE-2014-5161
- cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.10.4:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.10.5:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.10.6:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.10.7:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.10.8:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-5161
0.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 42 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-5161
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-5161
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-5161
-
http://www.debian.org/security/2014/dsa-3002
Debian -- Security Information -- DSA-3002-1 wireshark
-
http://secunia.com/advisories/57593
Sign in
-
http://www.wireshark.org/security/wnpa-sec-2014-08.html
Wireshark · wnpa-sec-2014-08 · Catapult DCT2000 and IrDA dissector crashVendor Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-08/msg00025.html
openSUSE-SU-2014:1038-1: moderate: update for wireshark
-
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html
[security-announce] SUSE-SU-2014:1221-1: important: Security update for
-
http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html
openSUSE-SU-2014:1249-1: moderate: wireshark: update to 1.10.10 security
-
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=16f8ba1bed579344df373bf38fff552ab8baf380
code.wireshark Code Review - wireshark.git/commitPatch
-
https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=16f8ba1bed579344df373bf38fff552ab8baf380
Jump to