Executive Summary

Informations
Name CVE-2014-2907 First vendor Publication 2014-04-24
Vendor Cve Last vendor Modification 2023-11-07

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:P)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The srtp_add_address function in epan/dissectors/packet-rtp.c in the RTP dissector in Wireshark 1.10.x before 1.10.7 does not properly update SRTP conversation data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2907

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:25044
 
Oval ID: oval:org.mitre.oval:def:25044
Title: The srtp_add_address function in epan/dissectors/packet-rtp.c in the RTP dissector in Wireshark 1.10.x before 1.10.7 does not properly update SRTP conversation data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
Description: The srtp_add_address function in epan/dissectors/packet-rtp.c in the RTP dissector in Wireshark 1.10.x before 1.10.7 does not properly update SRTP conversation data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
Family: windows Class: vulnerability
Reference(s): CVE-2014-2907
Version: 3
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Wireshark
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7

Nessus® Vulnerability Scanner

Date Description
2015-01-19 Name : The remote Solaris system is missing a security patch for third-party software.
File : solaris11_wireshark_20140731.nasl - Type : ACT_GATHER_INFO
2014-06-30 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201406-33.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-343.nasl - Type : ACT_GATHER_INFO
2014-05-05 Name : The remote Windows host contains an application that is affected by a denial ...
File : wireshark_1_10_7.nasl - Type : ACT_GATHER_INFO
2014-04-25 Name : The remote Fedora host is missing a security update.
File : fedora_2014-5514.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=30ba4...
Source Url
CONFIRM http://www.wireshark.org/security/wnpa-sec-2014-06.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9885
SUSE http://lists.opensuse.org/opensuse-updates/2014-05/msg00022.html

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2023-11-07 21:45:33
  • Multiple Updates
2021-05-04 12:31:03
  • Multiple Updates
2021-04-22 01:37:39
  • Multiple Updates
2020-05-23 00:40:42
  • Multiple Updates
2015-01-21 13:26:49
  • Multiple Updates
2014-07-01 13:25:29
  • Multiple Updates
2014-06-14 13:37:24
  • Multiple Updates
2014-05-23 09:21:50
  • Multiple Updates
2014-05-06 13:25:49
  • Multiple Updates
2014-04-26 13:22:00
  • Multiple Updates
2014-04-25 00:20:03
  • Multiple Updates
2014-04-24 17:19:10
  • First insertion