Vulnerability Details : CVE-2014-6422
The SDP dissector in Wireshark 1.10.x before 1.10.10 creates duplicate hashtables for a media channel, which allows remote attackers to cause a denial of service (application crash) via a crafted packet to the RTP dissector.
Vulnerability category: Denial of service
Products affected by CVE-2014-6422
- cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.10.4:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.10.5:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.10.6:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.10.7:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.10.8:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.10.9:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-6422
0.57%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 66 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-6422
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-6422
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-6422
-
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920
9920 – Buildbot crash output: fuzz-2014-03-22-14025.pcap
-
http://www.wireshark.org/security/wnpa-sec-2014-12.html
Wireshark · wnpa-sec-2014-12 · RTP dissector crash
-
http://linux.oracle.com/errata/ELSA-2014-1676
404 Not Found
-
http://rhn.redhat.com/errata/RHSA-2014-1676.html
RHSA-2014:1676 - Security Advisory - Red Hat Customer Portal
-
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html
[security-announce] SUSE-SU-2014:1221-1: important: Security update for
-
http://secunia.com/advisories/60280
Sign in
-
http://secunia.com/advisories/60578
Sign in
-
http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html
openSUSE-SU-2014:1249-1: moderate: wireshark: update to 1.10.10 security
-
http://linux.oracle.com/errata/ELSA-2014-1677
404 Not Found
-
http://secunia.com/advisories/61933
Sign in
-
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=04c05a21e34cec326f1aff2f5f8a6e74e1ced984
code.wireshark Code Review - wireshark.git/commitPatch
-
http://secunia.com/advisories/61929
Sign in
-
http://rhn.redhat.com/errata/RHSA-2014-1677.html
RHSA-2014:1677 - Security Advisory - Red Hat Customer Portal
-
http://www.debian.org/security/2014/dsa-3049
Debian -- Security Information -- DSA-3049-1 wireshark
-
https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=04c05a21e34cec326f1aff2f5f8a6e74e1ced984
Jump to