Bug 1074109 (CVE-2014-2299) - CVE-2014-2299 wireshark: buffer overflow in MPEG file parser (wnpa-sec-2014-04)
Summary: CVE-2014-2299 wireshark: buffer overflow in MPEG file parser (wnpa-sec-2014-04)
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-2299
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1074117 1074118 1074904 1074905 1074925 1074926
Blocks: 1074116
TreeView+ depends on / blocked
 
Reported: 2014-03-08 00:54 UTC by Vincent Danen
Modified: 2021-02-17 06:47 UTC (History)
7 users (show)

Fixed In Version: wireshark 1.10.6, wireshark 1.8.13
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-07-09 03:22:22 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:0341 0 normal SHIPPED_LIVE Moderate: wireshark security update 2014-03-31 20:31:57 UTC
Red Hat Product Errata RHSA-2014:0342 0 normal SHIPPED_LIVE Moderate: wireshark security update 2014-03-31 20:36:59 UTC

Description Vincent Danen 2014-03-08 00:54:26 UTC
It was reported that Wireshark's MPEG file parser could overflow a buffer.  It may be possible to make Wireshark crash or execute malicious code by convincing someone to read a malformed packet trace file.

This is reported to affect Wireshark versions 1.10.0 to 1.10.5 and 1.8.0 to 1.8.12.  It is fixed in 1.10.6 and 1.8.13.

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9843


External References:

http://www.wireshark.org/security/wnpa-sec-2014-04.html

Comment 2 Vincent Danen 2014-03-08 01:13:49 UTC
Created wireshark tracking bugs for this issue:

Affects: fedora-all [bug 1074118]

Comment 7 errata-xmlrpc 2014-03-31 16:38:07 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2014:0342 https://rhn.redhat.com/errata/RHSA-2014-0342.html

Comment 8 errata-xmlrpc 2014-03-31 18:02:15 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2014:0341 https://rhn.redhat.com/errata/RHSA-2014-0341.html


Note You need to log in before you can comment on or make changes to this bug.