CVE-2014-4174Improper Restriction of Operations within the Bounds of a Memory Buffer in Wireshark

Severity
9.3CRITICALNVD
EPSS
1.5%
top 18.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 18
Latest updateFeb 22

Description

wiretap/libpcap.c in the libpcap file parser in Wireshark 1.10.x before 1.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted packet-trace file that includes a large packet.

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages3 packages

debiandebian/wireshark< wireshark 1.10.4-1 (bookworm)
Debianwireshark/wireshark< 1.10.4-1+3
NVDwireshark/wireshark4 versions+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-mvm8-xfgh-xjqv: wiretap/libpcap2022-05-17
OSV
CVE-2014-4174: wiretap/libpcap2014-06-18

📋Vendor Advisories

2
Red Hat
libpcap: file parser crash (wnpa-sec-2014-05)2014-04-09
Debian
CVE-2014-4174: wireshark - wiretap/libpcap.c in the libpcap file parser in Wireshark 1.10.x before 1.10.4 a...2014

📄Research Papers

1
arXiv
Exploring Emerging Trends in 5G Malicious Traffic Analysis and Incremental Learning Intrusion Detection Strategies2024-02-22

💬Community

1
Bugzilla
CVE-2014-4174 libpcap: file parser crash (wnpa-sec-2014-05)2014-04-10