CVE-2014-6428Improper Restriction of Operations within the Bounds of a Memory Buffer in Wireshark

Severity
5.0MEDIUMNVD
EPSS
0.9%
top 24.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 20
Latest updateMay 17

Description

The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/wireshark< wireshark 1.12.1+g01b65bf-1 (bookworm)
Debianwireshark/wireshark< 1.12.1+g01b65bf-1+3
NVDwireshark/wireshark11 versions+10

🔴Vulnerability Details

2
GHSA
GHSA-r2fw-54pj-g46j: The dissect_spdu function in epan/dissectors/packet-ses2022-05-17
OSV
CVE-2014-6428: The dissect_spdu function in epan/dissectors/packet-ses2014-09-20

📋Vendor Advisories

2
Red Hat
wireshark: SES dissector crash (wnpa-sec-2014-18)2014-09-07
Debian
CVE-2014-6428: wireshark - The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector i...2014

💬Community

2
Bugzilla
CVE-2014-6430 CVE-2014-6421 CVE-2014-6422 CVE-2014-6423 CVE-2014-6424 CVE-2014-6432 CVE-2014-6431 CVE-2014-6427 CVE-2014-6428 CVE-2014-6429 wireshark: various flaws [fedora-all]2014-09-17
Bugzilla
CVE-2014-6428 wireshark: SES dissector crash (wnpa-sec-2014-18)2014-09-17