CVE-2014-5162Improper Restriction of Operations within the Bounds of a Memory Buffer in Wireshark

Severity
5.0MEDIUMNVD
EPSS
0.3%
top 44.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 1
Latest updateMay 17

Description

The read_new_line function in wiretap/catapult_dct2000.c in the Catapult DCT2000 dissector in Wireshark 1.10.x before 1.10.9 does not properly strip '\n' and '\r' characters, which allows remote attackers to cause a denial of service (off-by-one buffer underflow and application crash) via a crafted packet.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/wireshark< wireshark 1.12.0+git+4fab41a1-1 (bookworm)
Debianwireshark/wireshark< 1.12.0+git+4fab41a1-1+3
NVDwireshark/wireshark9 versions+8

🔴Vulnerability Details

2
GHSA
GHSA-9mrv-c5r7-p6wx: The read_new_line function in wiretap/catapult_dct20002022-05-17
OSV
CVE-2014-5162: The read_new_line function in wiretap/catapult_dct20002014-08-01

📋Vendor Advisories

2
Red Hat
wireshark: Catapult DCT2000 and IrDA dissectors buffer underrun (wnpa-sec-2014-08)2014-07-31
Debian
CVE-2014-5162: wireshark - The read_new_line function in wiretap/catapult_dct2000.c in the Catapult DCT2000...2014

💬Community

2
Bugzilla
CVE-2014-5164 CVE-2014-5165 CVE-2014-5161 CVE-2014-5162 CVE-2014-5163 wireshark: various flaws [fedora-all]2014-08-01
Bugzilla
CVE-2014-5161 CVE-2014-5162 wireshark: Catapult DCT2000 and IrDA dissectors buffer underrun (wnpa-sec-2014-08)2014-08-01