Bug 881701 (CVE-2012-5602, CVE-2012-6058) - CVE-2012-5602 CVE-2012-6058 wireshark: DoS (infinite loop) in the ICMPv6 dissector (wnpa-sec-2012-40)
Summary: CVE-2012-5602 CVE-2012-6058 wireshark: DoS (infinite loop) in the ICMPv6 diss...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2012-5602, CVE-2012-6058
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 881873
Blocks: 881865
TreeView+ depends on / blocked
 
Reported: 2012-11-29 11:39 UTC by Jan Lieskovsky
Modified: 2021-02-17 08:19 UTC (History)
6 users (show)

Fixed In Version: Wireshark 1.6.12, Wireshark 1.8.4
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-11-30 04:30:53 UTC
Embargoed:


Attachments (Terms of Use)

Description Jan Lieskovsky 2012-11-29 11:39:24 UTC
A denial of service flaw was found in the way ICMPv6 dissector of Wireshark, a network traffic analyzer, performed dissection of certain ICMPv6 packet capture files. A remote attacker could provide a specially-crafted ICMPv6 packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet.

Upstream bug report:
[1] https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7844

References:
[2] http://www.wireshark.org/security/wnpa-sec-2012-40.html
[3] http://www.wireshark.org/docs/relnotes/wireshark-1.6.12.html
[4] http://www.wireshark.org/docs/relnotes/wireshark-1.8.4.html

Relevant upstream patches:
[5] http://anonsvn.wireshark.org/viewvc?view=revision&revision=45452
[6] http://anonsvn.wireshark.org/viewvc?view=revision&revision=45459

Reproducer:
[7] http://www.wireshark.org/download/automated/captures/fuzz-2012-10-10-4301.pcap

Comment 2 Jan Lieskovsky 2012-11-29 17:31:55 UTC
This issue did NOT affect the versions of the wireshark package, as shipped with Red Hat Enterprise Linux 5 and 6.

--

This issue affects the versions of the wireshark package, as shipped with Fedora release of 16 and 17.

Comment 3 Jan Lieskovsky 2012-11-29 17:49:29 UTC
Created wireshark tracking bugs for this issue

Affects: fedora-all [bug 881873]

Comment 4 Vincent Danen 2012-11-29 22:16:44 UTC
This was assigned CVE-2012-5602:

http://www.openwall.com/lists/oss-security/2012/11/29/5

Comment 5 Vincent Danen 2012-11-29 22:16:57 UTC
Statement CVE-2012-6058:

Not vulnerable. This issue did not affect the versions of wireshark as shipped with Red Hat Enterprise Linux 5 and 6.

Comment 6 Jan Lieskovsky 2012-12-05 13:57:51 UTC
The CVE-2012-5602 identifier has been rejected by Mitre in favour of CVE-2012-6058 one:

Name: CVE-2012-5602

** REJECT **

DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6058.  Reason:
This candidate is a reservation duplicate of CVE-2012-6058.  Notes:
All CVE users should reference CVE-2012-6058 instead of this
candidate.  All references and descriptions in this candidate have
been removed to prevent accidental usage.

--

The correct CVE identifier this particular wireshark flaw should be referenced under (from now on) is CVE-2012-6058.


Note You need to log in before you can comment on or make changes to this bug.