{"id":"DEBIAN-CVE-2014-2283","details":"epan/dissectors/packet-rlc in the RLC dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 uses inconsistent memory-management approaches, which allows remote attackers to cause a denial of service (use-after-free error and application crash) via a crafted UMTS Radio Link Control packet.","modified":"2026-03-11T07:15:37.429427Z","published":"2014-03-11T13:01:10.263Z","upstream":["CVE-2014-2283"],"references":[{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2014-2283"}],"affected":[{"package":{"name":"wireshark","ecosystem":"Debian:11","purl":"pkg:deb/debian/wireshark?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.10.6-1"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2014-2283.json"}},{"package":{"name":"wireshark","ecosystem":"Debian:12","purl":"pkg:deb/debian/wireshark?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.10.6-1"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2014-2283.json"}},{"package":{"name":"wireshark","ecosystem":"Debian:13","purl":"pkg:deb/debian/wireshark?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.10.6-1"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2014-2283.json"}},{"package":{"name":"wireshark","ecosystem":"Debian:14","purl":"pkg:deb/debian/wireshark?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.10.6-1"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2014-2283.json"}}],"schema_version":"1.7.5"}