Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1163581 - (CVE-2014-8714) CVE-2014-8714 wireshark: TN5250 infinite loop (wnpa-sec-2014-23)
CVE-2014-8714 wireshark: TN5250 infinite loop (wnpa-sec-2014-23)
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20141020,repor...
: Security
Depends On: 1163585 1208005 1245763
Blocks: 1163586 1210268
  Show dependency treegraph
 
Reported: 2014-11-12 23:25 EST by Murray McAllister
Modified: 2015-11-24 07:21 EST (History)
6 users (show)

See Also:
Fixed In Version: wireshark 1.12.2, wireshark 1.10.11
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-11-19 23:43:10 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:1460 normal SHIPPED_LIVE Moderate: wireshark security, bug fix, and enhancement update 2015-07-21 10:14:59 EDT
Red Hat Product Errata RHSA-2015:2393 normal SHIPPED_LIVE Moderate: wireshark security, bug fix, and enhancement update 2015-11-19 06:03:11 EST

  None (edit)
Description Murray McAllister 2014-11-12 23:25:55 EST
An infinite loop issue was discovered in Wireshark's TN5250 dissector. It may be possible to make Wireshark consume an excessive amount of CPU by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

This is reported to affect Wireshark versions 1.12.0 to 1.12.1, and 1.10.0 to 1.10.10. It is fixed in versions 1.12.2 and 1.10.11.

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10596

The version of Wireshark in Red Hat Enterprise Linux 5 and 6 is older than 1.10.x, and may not be affected. The version of Wireshark in Red Hat Enterprise Linux 7 is affected.

External References:

https://www.wireshark.org/security/wnpa-sec-2014-23.html
Comment 1 Murray McAllister 2014-11-12 23:32:15 EST
Created wireshark tracking bugs for this issue:

Affects: fedora-all [bug 1163585]
Comment 2 Siddharth Sharma 2014-11-14 07:36:09 EST
upstream fix
------------

Patch1: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=patch;h=d7174c0fcb19dd31526117298133f7a9767e848e
Comment 3 Fedora Update System 2014-12-04 01:22:07 EST
wireshark-1.10.11-1.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 6 Siddharth Sharma 2015-01-14 13:26:56 EST
Analysis
========

In the code of Wireshark's TN5250 dissector 

If value of length becomes 0 

        while ((offset - start) < sf_length) {
          length = tvb_get_guint8(tvb,offset);
...
          offset += length; // offset = offset + 0 ;
        }

then the value of offset does not increase, which can lead to infinite loop, causing consumption of CPU and memory.
Comment 8 errata-xmlrpc 2015-07-22 03:23:55 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2015:1460 https://rhn.redhat.com/errata/RHSA-2015-1460.html
Comment 12 errata-xmlrpc 2015-11-19 07:36:13 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2015:2393 https://rhn.redhat.com/errata/RHSA-2015-2393.html
Comment 13 Huzaifa S. Sidhpurwala 2015-11-19 23:43:10 EST
Statement:

This issue did not affect the version of wireshark as shipped with Red Hat Enterprise Linux 5

Note You need to log in before you can comment on or make changes to this bug.