Comment 4Riccardo Schirone
2019-05-15 14:14:18 UTC
Function dissect_spoolss_buffer_data() in dissectors/packet-dcerpc-spoolss.c dissects a size value and then uses it to retrieve some data. However, the size value is not validated, thus it can cause the program to read out of bounds, leaking memory content or making the application crash.
Comment 5Riccardo Schirone
2019-05-16 09:14:15 UTC
A crash due to a heap-based out-of-bounds read can be observed in an ASAN build of Wireshark, by feeding a malformed file to tshark ("$ ./tshark -nVxr /path/to/file"): External Referencies: https://www.wireshark.org/security/wnpa-sec-2019-18.html Upstream bug(s): https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15568