Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2014-5165 | First vendor Publication | 2014-08-01 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The dissect_ber_constrained_bitstring function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.10.x before 1.10.9 does not properly validate padding values, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5165 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:26018 | |||
Oval ID: | oval:org.mitre.oval:def:26018 | ||
Title: | DSA-3002-1 wireshark - security update | ||
Description: | Multiple vulnerabilities were discovered in the dissectors for Catapult DCT2000, IrDA, GSM Management, RLC ASN.1 BER, which could result in denial of service. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-3002-1 CVE-2014-5161 CVE-2014-5162 CVE-2014-5163 CVE-2014-5164 CVE-2014-5165 | Version: | 3 |
Platform(s): | Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | wireshark |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27036 | |||
Oval ID: | oval:org.mitre.oval:def:27036 | ||
Title: | SUSE-SU-2014:1221-1 -- Security update for wireshark | ||
Description: | The wireshark package was upgraded to 1.10.10 from 1.8.x as 1.8 was discontinued. This update fixes vulnerabilities that could allow an attacker to crash Wireshark or make it become unresponsive by sending specific packets onto the network or have them loaded via a capture file while the dissectors are running. It also contains a number of other bug fixes. * RTP dissector crash. (wnpa-sec-2014-12 CVE-2014-6421 CVE-2014-6422) * MEGACO dissector infinite loop. (wnpa-sec-2014-13 CVE-2014-6423) * Netflow dissector crash. (wnpa-sec-2014-14 CVE-2014-6424) * RTSP dissector crash. (wnpa-sec-2014-17 CVE-2014-6427) * SES dissector crash. (wnpa-sec-2014-18 CVE-2014-6428) * Sniffer file parser crash. (wnpa-sec-2014-19 CVE-2014-6429 CVE-2014-6430 CVE-2014-6431 CVE-2014-6432) * The Catapult DCT2000 and IrDA dissectors could underrun a buffer. (wnpa-sec-2014-08 CVE-2014-5161 CVE-2014-5162, bnc#889901) * The GSM Management dissector could crash. (wnpa-sec-2014-09 CVE-2014-5163, bnc#889906) * The RLC dissector could crash. (wnpa-sec-2014-10 CVE-2014-5164, bnc#889900) * The ASN.1 BER dissector could crash. (wnpa-sec-2014-11 CVE-2014-5165, bnc#889899) Further bug fixes as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.10.10.html <https://www.wireshark.org/docs/relnotes/wireshark-1.10.10.html> and https://www.wireshark.org/docs/relnotes/wireshark-1.10.9.html <https://www.wireshark.org/docs/relnotes/wireshark-1.10.9.html> . Security Issues: * CVE-2014-5161 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5161> * CVE-2014-5162 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5162> * CVE-2014-5163 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5163> * CVE-2014-5164 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5164> * CVE-2014-5165 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5165> * CVE-2014-6421 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6421> * CVE-2014-6422 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6422> * CVE-2014-6423 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6423> * CVE-2014-6424 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6424> * CVE-2014-6427 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6427> * CVE-2014-6428 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6428> * CVE-2014-6429 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6429> * CVE-2014-6430 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6430> * CVE-2014-6431 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6431> * CVE-2014-6432 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6432> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1221-1 CVE-2014-6421 CVE-2014-6422 CVE-2014-6423 CVE-2014-6424 CVE-2014-6427 CVE-2014-6428 CVE-2014-6429 CVE-2014-6430 CVE-2014-6431 CVE-2014-6432 CVE-2014-5161 CVE-2014-5162 CVE-2014-5163 CVE-2014-5164 CVE-2014-5165 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | wireshark |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2014-08-07 | IAVM : 2014-B-0104 - Multiple Denial of Service Vulnerabilities in Wireshark Severity : Category I - VMSKEY : V0053635 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_wireshark_20140915.nasl - Type : ACT_GATHER_INFO |
2014-10-02 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-566.nasl - Type : ACT_GATHER_INFO |
2014-09-29 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_wireshark-140923.nasl - Type : ACT_GATHER_INFO |
2014-09-02 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201409-01.nasl - Type : ACT_GATHER_INFO |
2014-08-21 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-499.nasl - Type : ACT_GATHER_INFO |
2014-08-11 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3002.nasl - Type : ACT_GATHER_INFO |
2014-08-09 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-159.nasl - Type : ACT_GATHER_INFO |
2014-08-08 | Name : The remote Fedora host is missing a security update. File : fedora_2014-9112.nasl - Type : ACT_GATHER_INFO |
2014-08-04 | Name : The remote Windows host contains an application that is affected by multiple ... File : wireshark_1_10_9.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 12:41:59 |
|
2023-11-07 21:45:24 |
|
2021-05-04 12:33:24 |
|
2021-04-22 01:40:08 |
|
2020-05-23 00:41:45 |
|
2017-01-07 09:25:41 |
|
2016-04-27 01:04:49 |
|
2015-01-21 13:26:59 |
|
2014-10-10 13:27:25 |
|
2014-10-03 13:27:19 |
|
2014-09-30 13:27:32 |
|
2014-09-03 13:25:16 |
|
2014-08-22 13:26:51 |
|
2014-08-12 13:24:02 |
|
2014-08-10 13:25:18 |
|
2014-08-09 13:25:16 |
|
2014-08-08 21:23:13 |
|
2014-08-05 13:25:57 |
|
2014-08-02 00:22:21 |
|
2014-08-01 17:22:37 |
|