Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-2299

Опубликовано: 11 мар. 2014
Источник: debian
EPSS Средний

Описание

Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wiresharkfixed1.10.6-1package

Примечания

  • https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9843

  • http://www.wireshark.org/security/wnpa-sec-2014-04.html

EPSS

Процентиль: 98%
0.68309
Средний

Связанные уязвимости

ubuntu
больше 11 лет назад

Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.

redhat
больше 11 лет назад

Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.

nvd
больше 11 лет назад

Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.

github
около 3 лет назад

Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.

oracle-oval
около 11 лет назад

ELSA-2014-0342: wireshark security update (MODERATE)

EPSS

Процентиль: 98%
0.68309
Средний