CVE-2014-2283
Published Mar 11, 2014
Last updated a year ago
Overview
- Description
- epan/dissectors/packet-rlc in the RLC dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 uses inconsistent memory-management approaches, which allows remote attackers to cause a denial of service (use-after-free error and application crash) via a crafted UMTS Radio Link Control packet.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- <a href="http://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "606DF728-1DA6-4989-B40A-44471CC677DB" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F824AE6B-B087-4C69-8F73-7B146920FC3C" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6702EAA1-7FBD-4755-B7C2-C2B3A1AFF142" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF6D1967-500E-4E96-A6D2-CE17EA839572" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8400AD4-ECE9-4810-B559-D4EB03AECC50" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "424B66E9-56F8-4D87-94C6-80F5EA0BD1B2" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6BD261DB-1794-473F-BAD9-E5B7771288BD" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1007895-7CC2-4C2D-BACB-BAE6DECDB840" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "392CF289-F905-4D9B-BA51-90F2BCA07BDA" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "405C4D3A-79C7-4B87-AB33-2405E1EF21A2" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A9A389B-44E3-48C3-8140-5735E88AA0A9" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A40ABFC-502B-41B1-8745-058AA0690700" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5957208D-DBF6-42EB-A27A-B9E9D5BC266E" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "481435A6-4790-4B3E-8EEA-0394A6AB481A" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B0BB28A-9E61-4073-9BE2-C34AB2BCF1EB" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0753BF56-C829-48C3-AA6E-C0A2A1EA1124" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.10.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC206A02-8259-4FA0-8B6F-D8C58AB946C9" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.10.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B973D7E1-523B-4AB9-965F-F8BBD2420CFA" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.10.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "633AE75A-89BB-458D-9609-2C238DAC25C6" } ], "operator": "OR" } ] } ]