Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-2879: Fuzz job crash output: fuzz-2023-05-13-7062.pcap (#19068) · Issues · Wireshark Foundation / wireshark · GitLab

GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file

CVE
#ubuntu#linux#dos#git#ssl

Skip to content

Open Issue created May 13, 2023 by A Wireshark GitLab Utility@ws-gitlab-utilityDeveloper

Fuzz job crash output: fuzz-2023-05-13-7062.pcap

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2023-05-13-7062.pcap.gz

stderr:

Branch: release-4.0
Input file: /var/menagerie/menagerie/ultimate_wireshark_protocols_pcap_220213.pcap
CI job name: ASan Menagerie Fuzz, ID: 4280378212
CI job URL: https://gitlab.com/wireshark/wireshark/-/jobs/4280378212
Return value: 0
Dissector bug: 0
Date and time: Sat May 13 21:03:22 UTC 2023

Commits in the last 48 hours:
b1d3523e17 media_type: Register dissector table as case-insensitive

Build host information:
Linux 5.19.0-38-generic #39~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Fri Mar 17 21:16:15 UTC 2 x86_64
Distributor ID: Ubuntu
Description:    Ubuntu 22.04.2 LTS
Release:    22.04
Codename:   jammy

Command and args: /builds/wireshark/wireshark/_install/bin/tshark -2  -nVxr
Running as user "root" and group "root". This could be dangerous.
 ** (tshark:35361) 20:53:24.160732 [Epan WARNING] -- Dissector bug, protocol GSUP, in packet 3843: epan/dissectors/packet-gsm_gsup.c:603: failed assertion "0"
 ** (tshark:35361) 20:53:25.894896 [Epan WARNING] -- Dissector bug, protocol TLS, in packet 9217: epan/dissectors/packet-tls.c:2257: failed assertion "frag_len != 0"
 ** (tshark:35361) 20:53:27.374344 [Epan WARNING] -- Dissector bug, protocol GNW, in packet 14307: epan/dissectors/packet-geonw.c:1263: failed assertion "!(tmp_val & 0xffffffff00000000)"
 ** (tshark:35361) 20:53:30.401611 [Epan WARNING] -- Dissector bug, protocol TPM2.0, in packet 24511: epan/dissectors/packet-tpm20.c:1050: failed assertion "command_entry != ((void*)0)"

fuzz-test.sh stderr:
Running as user "root" and group "root". This could be dangerous.
./tools/fuzz-test.sh: line 263: 35361 CPU time limit exceeded (core dumped) "$RUNNER" $COMMON_ARGS $ARGS "$TMP_DIR/$TMP_FILE" > /dev/null 2>> "$TMP_DIR/$ERR_FILE.$SUBSHELL_PID"
./tools/fuzz-test.sh: line 263: 35360 CPU time limit exceeded (core dumped) "$RUNNER" $COMMON_ARGS $ARGS "$TMP_DIR/$TMP_FILE" > /dev/null 2>> "$TMP_DIR/$ERR_FILE.$SUBSHELL_PID"

no debug trace

Related news

Gentoo Linux Security Advisory 202309-02

Gentoo Linux Security Advisory 202309-2 - Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service. Versions greater than or equal to 4.0.6 are affected.

Debian Security Advisory 5429-1

Debian Linux Security Advisory 5429-1 - Multiple vulnerabilities have been discovered in Wireshark, a network protocol analyzer which could result in denial of service or the execution of arbitrary code.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907