A crash due to a heap-based out-of-bounds read can be observed in an ASAN build of Wireshark, by feeding a malformed file to tshark ("$ ./tshark -nVxr /path/to/file"): External Referencies: https://www.wireshark.org/security/wnpa-sec-2019-18.html Upstream bug(s): https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15568
Created wireshark tracking bugs for this issue: Affects: fedora-all [bug 1697899]
Upstream patch: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=5aba3ed0cdebc1ec960261e3e9eda87c8408259f
Function dissect_spoolss_buffer_data() in dissectors/packet-dcerpc-spoolss.c dissects a size value and then uses it to retrieve some data. However, the size value is not validated, thus it can cause the program to read out of bounds, leaking memory content or making the application crash.
External References: https://www.wireshark.org/security/wnpa-sec-2019-18.html