CVE-2014-2282Improper Restriction of Operations within the Bounds of a Memory Buffer in Wireshark

Severity
4.3MEDIUMNVD
EPSS
0.6%
top 30.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 11
Latest updateMay 17

Description

The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua.c in the M3UA dissector in Wireshark 1.10.x before 1.10.6 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted SS7 MTP3 packet.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9

Affected Packages3 packages

debiandebian/wireshark< wireshark 1.10.6-1 (bookworm)
Debianwireshark/wireshark< 1.10.6-1+3
NVDwireshark/wireshark6 versions+5

Patches

🔴Vulnerability Details

2
GHSA
GHSA-jq5p-rpmm-mhv2: The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua2022-05-17
OSV
CVE-2014-2282: The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua2014-03-11

📋Vendor Advisories

2
Red Hat
wireshark: M3UA dissector crash (wnpa-sec-2014-02)2014-03-07
Debian
CVE-2014-2282: wireshark - The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua.c in...2014

💬Community

2
Bugzilla
CVE-2014-2281 CVE-2014-2282 CVE-2014-2283 CVE-2014-2299 wireshark: various flaws [fedora-all]2014-03-08
Bugzilla
CVE-2014-2282 wireshark: M3UA dissector crash (wnpa-sec-2014-02)2014-03-08