Bug 2235813 (CVE-2023-4512)

Summary: CVE-2023-4512 wireshark: DoS (crash) via packet injection or crafted capture file
Product: [Other] Security Response Reporter: Anten Skrabec <askrabec>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: dfreiber, fhrdina, jburrell, mruprich, rogbas, vkumar
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: wireshark 4.0.8, wireshark 3.6.16 Doc Type: If docs needed, set a value
Doc Text:
A denial of service vulnerability was found in Wireshark due to insufficient validation of user-supplied input in the CBOR protocol dissector. This issue could allow a remote attacker to inject a malformed packet onto the wire or persuade someone to read a corrupted packet trace file. The issue manifests as an uncontrolled recursion loop leading to a stack overflow, resulting in Wireshark crashing.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2235988, 2235989, 2236001, 2236002, 2236003, 2236005    
Bug Blocks: 2235815    

Description Anten Skrabec 2023-08-29 19:46:25 UTC
CBOR dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file

https://gitlab.com/wireshark/wireshark/-/issues/19144
https://www.wireshark.org/security/wnpa-sec-2023-23.html

Comment 5 msiddiqu 2023-08-30 06:38:44 UTC
Created wireshark tracking bugs for this issue:

Affects: fedora-all [bug 2236005]