Bug 1697898 (CVE-2019-10903) - CVE-2019-10903 wireshark: DCERPC SPOOLSS dissector crash (wnpa-sec-2019-18)
Summary: CVE-2019-10903 wireshark: DCERPC SPOOLSS dissector crash (wnpa-sec-2019-18)
Status: NEW
Alias: CVE-2019-10903
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Whiteboard: impact=moderate,public=20190305,repor...
Depends On: 1710755 1697899
Blocks: 1697993
TreeView+ depends on / blocked
Reported: 2019-04-09 09:22 UTC by Marian Rehak
Modified: 2019-05-16 09:15 UTC (History)
8 users (show)

Fixed In Version: wireshark 3.0.1, wireshark 2.6.8, wireshark 2.4.14
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed:

Attachments (Terms of Use)

Description Marian Rehak 2019-04-09 09:22:55 UTC
A crash due to a heap-based out-of-bounds read can be observed in an ASAN build of Wireshark, by feeding a malformed file to tshark ("$ ./tshark -nVxr /path/to/file"):

External Referencies:

Upstream bug(s):

Comment 1 Marian Rehak 2019-04-09 09:23:17 UTC
Created wireshark tracking bugs for this issue:

Affects: fedora-all [bug 1697899]

Comment 4 Riccardo Schirone 2019-05-15 14:14:18 UTC
Function dissect_spoolss_buffer_data() in dissectors/packet-dcerpc-spoolss.c dissects a size value and then uses it to retrieve some data. However, the size value is not validated, thus it can cause the program to read out of bounds, leaking memory content or making the application crash.

Comment 5 Riccardo Schirone 2019-05-16 09:14:15 UTC
External References:


Note You need to log in before you can comment on or make changes to this bug.