Wireshark RLC parser DoS Vulnerability (CVE-2014-5164)
Release date:
Updated on:
Affected Systems:
Wireshark <1.10.9
Description:
--------------------------------------------------------------------------------
Bugtraq id: 69002
CVE (CAN) ID: CVE-2014-5164
Wireshark is the most popular network protocol parser.
In the RLC parser of Wireshark 1.10.0-1.10.8, The rlc_decode_li function in epan/dissectors/packet-rlc.c initializes the schema member only after a member is used, this allows remote attackers to cause DOS through specially crafted packets.
Simple use of Wireshark
Install Wireshark in Ubuntu 12.04
Starting Wireshark packet capture from common users in Linux
<* Source: Buildbot Builder
Link: http://secunia.com/advisories/59299/
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Wireshark
---------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.wireshark.org/security/wnpa-sec-2014-10.html
Https://bugs.wireshark.org/bugzilla/show_bug.cgi? Id = 9795
Https://code.wireshark.org/review/gitweb? P = wireshark. git; a = commit; h = ba6eb5c72ffe82ca0e51c7083240975a5b118ad2
Wireshark details: click here
Wireshark: click here
This article permanently updates the link address: