SB2013122005 - Multiple vulnerabilities in Wireshark



SB2013122005 - Multiple vulnerabilities in Wireshark

Published: December 20, 2013 Updated: August 10, 2020

Security Bulletin ID SB2013122005
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Medium 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2014-4174)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

wiretap/libpcap.c in the libpcap file parser in Wireshark 1.10.x before 1.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted packet-trace file that includes a large packet.


2) Input validation error (CVE-ID: CVE-2013-7113)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.


Remediation

Install update from vendor's website.