First published: Wed Jun 18 2014(Updated: )
wiretap/libpcap.c in the libpcap file parser in Wireshark 1.10.x before 1.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted packet-trace file that includes a large packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark | =1.10.0 | |
Wireshark | =1.10.1 | |
Wireshark | =1.10.2 | |
Wireshark | =1.10.3 |
http://anonsvn.wireshark.org/viewvc/trunk-1.10/wiretap/libpcap.c?r1=53123&r2=53122&pathrev=53123
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4174 is considered critical as it allows remote attackers to execute arbitrary code or cause a denial of service.
To fix CVE-2014-4174, upgrade Wireshark to version 1.10.4 or later.
Wireshark versions 1.10.0 through 1.10.3 are affected by CVE-2014-4174.
CVE-2014-4174 can enable remote code execution and memory corruption attacks.
There are no known workarounds for CVE-2014-4174; upgrading Wireshark is the recommended action.