{"id":"CVE-2014-2299","details":"Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.","modified":"2026-04-10T03:43:40.412348Z","published":"2014-03-11T13:01:10Z","related":["MGASA-2014-0125","MGASA-2014-0126","SUSE-SU-2015:0426-1","SUSE-SU-2015:0653-1","SUSE-SU-2015:1098-1","openSUSE-SU-2024:10199-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-0341.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-0342.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/57480"},{"type":"ADVISORY","url":"http://secunia.com/advisories/57489"},{"type":"ADVISORY","url":"http://www.debian.org/security/2014/dsa-2871"},{"type":"ADVISORY","url":"http://www.wireshark.org/security/wnpa-sec-2014-04.html"},{"type":"REPORT","url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9843"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2014-03/msg00046.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2014-03/msg00047.html"},{"type":"WEB","url":"http://osvdb.org/show/osvdb/104199"},{"type":"WEB","url":"http://packetstormsecurity.com/files/126337/Wireshark-1.8.12-1.10.5-wiretap-mpeg.c-Stack-Buffer-Overflow.html"},{"type":"WEB","url":"http://www.exploit-db.com/exploits/33069"},{"type":"WEB","url":"http://www.securityfocus.com/bid/66066"},{"type":"WEB","url":"http://www.securitytracker.com/id/1029907"},{"type":"WEB","url":"https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f567435ac7140c96a5de56dbce3d5e7659af4d09"}],"schema_version":"1.7.5"}