The read_new_line function in wiretap/catapult_dct2000.c in the Catapult DCT2000 dissector in Wireshark 1.10.x before 1.10.9 does not properly strip '\n' and '\r' characters, which allows remote attackers to cause a denial of service (off-by-one buffer underflow and application crash) via a crafted packet.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-3002-1 wireshark security update
EUVD EUVD EUVD-2014-5060 The read_new_line function in wiretap/catapult_dct2000.c in the Catapult DCT2000 dissector in Wireshark 1.10.x before 1.10.9 does not properly strip '\n' and '\r' characters, which allows remote attackers to cause a denial of service (off-by-one buffer underflow and application crash) via a crafted packet.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T11:34:37.547Z

Reserved: 2014-07-31T00:00:00

Link: CVE-2014-5162

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-08-01T11:13:10.210

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-5162

cve-icon Redhat

Severity : Moderate

Publid Date: 2014-07-31T00:00:00Z

Links: CVE-2014-5162 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses