Bug 1697898 (CVE-2019-10903)

Summary: CVE-2019-10903 wireshark: DCERPC SPOOLSS dissector crash (wnpa-sec-2019-18)
Product: [Other] Security Response Reporter: Marian Rehak <mrehak>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: denis, huzaifas, lemenkov, mruprich, msehnout, phatina, rvokal, sergey.avseyev, tcullum
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: wireshark 3.0.1, wireshark 2.6.8, wireshark 2.4.14 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-06-29 20:11:53 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1697899, 1710755    
Bug Blocks: 1697993    

Description Marian Rehak 2019-04-09 09:22:55 UTC
A crash due to a heap-based out-of-bounds read can be observed in an ASAN build of Wireshark, by feeding a malformed file to tshark ("$ ./tshark -nVxr /path/to/file"):

External Referencies:
https://www.wireshark.org/security/wnpa-sec-2019-18.html

Upstream bug(s):
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15568

Comment 1 Marian Rehak 2019-04-09 09:23:17 UTC
Created wireshark tracking bugs for this issue:

Affects: fedora-all [bug 1697899]

Comment 4 Riccardo Schirone 2019-05-15 14:14:18 UTC
Function dissect_spoolss_buffer_data() in dissectors/packet-dcerpc-spoolss.c dissects a size value and then uses it to retrieve some data. However, the size value is not validated, thus it can cause the program to read out of bounds, leaking memory content or making the application crash.

Comment 5 Riccardo Schirone 2019-05-16 09:14:15 UTC
External References:

https://www.wireshark.org/security/wnpa-sec-2019-18.html