A denial of service flaw was found in Wireshark's OPC Unified Architecture
(OPCUA) dissector. Decoding a specially-crafted OPCUA PCAP capture file in
Wireshark would lead to excessive CPU use.
1. Load the pcap file
2. Open "Decode as ..." dialog, select Transport destination(12001)
as "opcua", and press OK
3. Wireshark gets freezed (see top output) at the dialog for about
2 minutes, and then show the packets as OpcUa.
This issue does NOT affect the versions of wireshark package, as shipped
with Red Hat Enterprise Linux 3, 4, or 5.
This issue affects latest versions of Wireshark package, as shipped
with Fedora releases of 10 and 11 (wireshark-1.2.1-1.fc10 and wireshark-1.2.1-1.fc11).
Common Vulnerabilities and Exposures assigned an identifier CVE-2009-3241 to
the following vulnerability:
Unspecified vulnerability in the OpcUa (OPC UA) dissector in Wireshark
0.99.6 through 1.0.8 and 1.2.0 through 1.2.1 allows remote attackers
to cause a denial of service (memory and CPU consumption) via
malformed OPCUA Service CallRequest packets.
wireshark-1.2.2-1.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report.