A denial of service flaw was found in Wireshark's OPC Unified Architecture (OPCUA) dissector. Decoding a specially-crafted OPCUA PCAP capture file in Wireshark would lead to excessive CPU use. References: ----------- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3986 http://www.wireshark.org/security/wnpa-sec-2009-05.html Reproducer: ----------- 1. Load the pcap file 2. Open "Decode as ..." dialog, select Transport destination(12001) as "opcua", and press OK 3. Wireshark gets freezed (see top output) at the dialog for about 2 minutes, and then show the packets as OpcUa. Upstream patch: --------------- http://anonsvn.wireshark.org/viewvc?view=rev&revision=29813 Credit: ------- vieuxtech
This issue does NOT affect the versions of wireshark package, as shipped with Red Hat Enterprise Linux 3, 4, or 5. This issue affects latest versions of Wireshark package, as shipped with Fedora releases of 10 and 11 (wireshark-1.2.1-1.fc10 and wireshark-1.2.1-1.fc11).
Common Vulnerabilities and Exposures assigned an identifier CVE-2009-3241 to the following vulnerability: Unspecified vulnerability in the OpcUa (OPC UA) dissector in Wireshark 0.99.6 through 1.0.8 and 1.2.0 through 1.2.1 allows remote attackers to cause a denial of service (memory and CPU consumption) via malformed OPCUA Service CallRequest packets. References: ----------- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3241 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3986 http://www.wireshark.org/security/wnpa-sec-2009-05.html http://www.wireshark.org/security/wnpa-sec-2009-06.html http://www.securityfocus.com/bid/36408 http://secunia.com/advisories/36754
wireshark-1.2.2-1.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report.