Bug 1697898 (CVE-2019-10903) - CVE-2019-10903 wireshark: DCERPC SPOOLSS dissector crash (wnpa-sec-2019-18)
Summary: CVE-2019-10903 wireshark: DCERPC SPOOLSS dissector crash (wnpa-sec-2019-18)
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2019-10903
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1697899 1710755
Blocks: 1697993
TreeView+ depends on / blocked
 
Reported: 2019-04-09 09:22 UTC by Marian Rehak
Modified: 2021-06-29 20:11 UTC (History)
9 users (show)

Fixed In Version: wireshark 3.0.1, wireshark 2.6.8, wireshark 2.4.14
Clone Of:
Environment:
Last Closed: 2021-06-29 20:11:53 UTC
Embargoed:


Attachments (Terms of Use)

Description Marian Rehak 2019-04-09 09:22:55 UTC
A crash due to a heap-based out-of-bounds read can be observed in an ASAN build of Wireshark, by feeding a malformed file to tshark ("$ ./tshark -nVxr /path/to/file"):

External Referencies:
https://www.wireshark.org/security/wnpa-sec-2019-18.html

Upstream bug(s):
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15568

Comment 1 Marian Rehak 2019-04-09 09:23:17 UTC
Created wireshark tracking bugs for this issue:

Affects: fedora-all [bug 1697899]

Comment 4 Riccardo Schirone 2019-05-15 14:14:18 UTC
Function dissect_spoolss_buffer_data() in dissectors/packet-dcerpc-spoolss.c dissects a size value and then uses it to retrieve some data. However, the size value is not validated, thus it can cause the program to read out of bounds, leaking memory content or making the application crash.

Comment 5 Riccardo Schirone 2019-05-16 09:14:15 UTC
External References:

https://www.wireshark.org/security/wnpa-sec-2019-18.html


Note You need to log in before you can comment on or make changes to this bug.