Executive Summary

Informations
Name CVE-2014-4174 First vendor Publication 2014-06-18
Vendor Cve Last vendor Modification 2014-06-19

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

wiretap/libpcap.c in the libpcap file parser in Wireshark 1.10.x before 1.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted packet-trace file that includes a large packet.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4174

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:25887
 
Oval ID: oval:org.mitre.oval:def:25887
Title: Denial of service vulnerability in the libpcap file parser in Wireshark
Description: wiretap/libpcap.c in the libpcap file parser in Wireshark 1.10.x before 1.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted packet-trace file that includes a large packet.
Family: windows Class: vulnerability
Reference(s): CVE-2014-4174
Version: 4
Platform(s): Microsoft Windows XP
Microsoft Windows 2000
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows 7
Microsoft Windows Server 2008 R2
Microsoft Windows 8
Microsoft Windows Server 2012
Microsoft Windows 8.1
Microsoft Windows Server 2012 R2
Product(s): Wireshark
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 4

Nessus® Vulnerability Scanner

Date Description
2014-06-30 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201406-33.nasl - Type : ACT_GATHER_INFO
2013-12-18 Name : The remote Windows host contains an application that is affected by multiple ...
File : wireshark_1_10_4.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM http://anonsvn.wireshark.org/viewvc?view=revision&revision=53123
http://anonsvn.wireshark.org/viewvc/trunk-1.10/wiretap/libpcap.c?r1=53123&...
http://www.wireshark.org/security/wnpa-sec-2014-05.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9753
MISC https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8808
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9390

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2021-05-04 12:32:41
  • Multiple Updates
2021-04-22 01:39:48
  • Multiple Updates
2020-05-23 00:41:22
  • Multiple Updates
2014-07-01 13:25:29
  • Multiple Updates
2014-06-20 13:24:49
  • Multiple Updates
2014-06-19 21:25:43
  • Multiple Updates
2014-06-18 21:25:25
  • First insertion