Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-2907

Опубликовано: 24 апр. 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3

Описание

The srtp_add_address function in epan/dissectors/packet-rtp.c in the RTP dissector in Wireshark 1.10.x before 1.10.7 does not properly update SRTP conversation data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

РелизСтатусПримечание
artful

not-affected

1.10.7-1
bionic

released

2.6.3-1~ubuntu18.04.1
devel

not-affected

2.6.3-1
esm-apps/bionic

released

2.6.3-1~ubuntu18.04.1
esm-apps/xenial

released

2.6.3-1~ubuntu16.04.1
esm-infra-legacy/trusty

not-affected

2.6.3-1~ubuntu14.04.1
lucid

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life

Показывать по

EPSS

Процентиль: 43%
0.00205
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

redhat
больше 11 лет назад

The srtp_add_address function in epan/dissectors/packet-rtp.c in the RTP dissector in Wireshark 1.10.x before 1.10.7 does not properly update SRTP conversation data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

nvd
больше 11 лет назад

The srtp_add_address function in epan/dissectors/packet-rtp.c in the RTP dissector in Wireshark 1.10.x before 1.10.7 does not properly update SRTP conversation data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

debian
больше 11 лет назад

The srtp_add_address function in epan/dissectors/packet-rtp.c in the R ...

github
около 3 лет назад

The srtp_add_address function in epan/dissectors/packet-rtp.c in the RTP dissector in Wireshark 1.10.x before 1.10.7 does not properly update SRTP conversation data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

fstec
больше 11 лет назад

Уязвимость программного обеспечения Wireshark Network Protocol Analyzer, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации

EPSS

Процентиль: 43%
0.00205
Низкий

4.3 Medium

CVSS2