Bug 1199168 (CVE-2015-2192)

Summary: CVE-2015-2192 wireshark: SCSI OSD dissector could go into an infinite loop (wnpa-sec-2015-11)
Product: [Other] Security Response Reporter: Vasyl Kaigorodov <vkaigoro>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: huzaifas, jrusnack, lemenkov, phatina, rvokal
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: Wireshark 1.12.4 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-03-25 12:36:22 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1199173    
Bug Blocks: 1199171    

Description Vasyl Kaigorodov 2015-03-05 14:41:27 UTC
From https://www.wireshark.org/security/wnpa-sec-2015-11.html

Name: SCSI OSD dissector infinite loop
Docid: wnpa-sec-2015-11
Date: March 4, 2015
Affected versions: 1.12.0 to 1.12.3


Description: The SCSI OSD dissector could go into an infinite loop. Discovered by Vlad Tsyrklevich.

It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

Comment 1 Vasyl Kaigorodov 2015-03-05 14:50:19 UTC
Created wireshark tracking bugs for this issue:

Affects: fedora-all [bug 1199173]

Comment 2 Vasyl Kaigorodov 2015-03-05 14:52:39 UTC

Not vulnerable. This issue did not affect the versions of wireshark as shipped with Red Hat Enterprise Linux 5, 6 and 7.