Headline
CVE-2023-2879: Fuzz job crash output: fuzz-2023-05-13-7062.pcap (#19068) · Issues · Wireshark Foundation / wireshark · GitLab
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
Skip to content
Open Issue created May 13, 2023 by A Wireshark GitLab Utility@ws-gitlab-utilityDeveloper
Fuzz job crash output: fuzz-2023-05-13-7062.pcap
Problems have been found with the following capture file:
https://www.wireshark.org/download/automated/captures/fuzz-2023-05-13-7062.pcap.gz
stderr:
Branch: release-4.0
Input file: /var/menagerie/menagerie/ultimate_wireshark_protocols_pcap_220213.pcap
CI job name: ASan Menagerie Fuzz, ID: 4280378212
CI job URL: https://gitlab.com/wireshark/wireshark/-/jobs/4280378212
Return value: 0
Dissector bug: 0
Date and time: Sat May 13 21:03:22 UTC 2023
Commits in the last 48 hours:
b1d3523e17 media_type: Register dissector table as case-insensitive
Build host information:
Linux 5.19.0-38-generic #39~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Fri Mar 17 21:16:15 UTC 2 x86_64
Distributor ID: Ubuntu
Description: Ubuntu 22.04.2 LTS
Release: 22.04
Codename: jammy
Command and args: /builds/wireshark/wireshark/_install/bin/tshark -2 -nVxr
Running as user "root" and group "root". This could be dangerous.
** (tshark:35361) 20:53:24.160732 [Epan WARNING] -- Dissector bug, protocol GSUP, in packet 3843: epan/dissectors/packet-gsm_gsup.c:603: failed assertion "0"
** (tshark:35361) 20:53:25.894896 [Epan WARNING] -- Dissector bug, protocol TLS, in packet 9217: epan/dissectors/packet-tls.c:2257: failed assertion "frag_len != 0"
** (tshark:35361) 20:53:27.374344 [Epan WARNING] -- Dissector bug, protocol GNW, in packet 14307: epan/dissectors/packet-geonw.c:1263: failed assertion "!(tmp_val & 0xffffffff00000000)"
** (tshark:35361) 20:53:30.401611 [Epan WARNING] -- Dissector bug, protocol TPM2.0, in packet 24511: epan/dissectors/packet-tpm20.c:1050: failed assertion "command_entry != ((void*)0)"
fuzz-test.sh stderr:
Running as user "root" and group "root". This could be dangerous.
./tools/fuzz-test.sh: line 263: 35361 CPU time limit exceeded (core dumped) "$RUNNER" $COMMON_ARGS $ARGS "$TMP_DIR/$TMP_FILE" > /dev/null 2>> "$TMP_DIR/$ERR_FILE.$SUBSHELL_PID"
./tools/fuzz-test.sh: line 263: 35360 CPU time limit exceeded (core dumped) "$RUNNER" $COMMON_ARGS $ARGS "$TMP_DIR/$TMP_FILE" > /dev/null 2>> "$TMP_DIR/$ERR_FILE.$SUBSHELL_PID"
no debug trace
Related news
Gentoo Linux Security Advisory 202309-2 - Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service. Versions greater than or equal to 4.0.6 are affected.
Debian Linux Security Advisory 5429-1 - Multiple vulnerabilities have been discovered in Wireshark, a network protocol analyzer which could result in denial of service or the execution of arbitrary code.