Bug 1868885 (CVE-2020-17498) - CVE-2020-17498 wireshark: Kafka protocol dissector could crash (wnpa-sec-2020-10)
Summary: CVE-2020-17498 wireshark: Kafka protocol dissector could crash (wnpa-sec-2020...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2020-17498
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1868886
Blocks: 1868887
TreeView+ depends on / blocked
 
Reported: 2020-08-14 06:48 UTC by Dhananjay Arunesh
Modified: 2021-02-16 19:29 UTC (History)
8 users (show)

Fixed In Version: wireshark 3.2.6
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-08-18 21:15:32 UTC
Embargoed:


Attachments (Terms of Use)

Description Dhananjay Arunesh 2020-08-14 06:48:53 UTC
In Wireshark 3.2.0 to 3.2.5, the Kafka protocol dissector could crash. This was addressed in epan/dissectors/packet-kafka.c by avoiding a double free during LZ4 decompression.

References:
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16672
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=76afda963de4f0b9be24f2d8e873990a5cbf221b

Comment 1 Dhananjay Arunesh 2020-08-14 06:49:30 UTC
Created wireshark tracking bugs for this issue:

Affects: fedora-all [bug 1868886]

Comment 3 Dhananjay Arunesh 2020-08-14 06:51:22 UTC
External References:

https://www.wireshark.org/security/wnpa-sec-2020-10.html

Comment 4 Todd Cullum 2020-08-18 17:16:18 UTC
Statement:

Wireshark as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8 is not affected because the vulnerable code was committed in newer versions of the package than those shipped.

Comment 5 Todd Cullum 2020-08-18 17:27:59 UTC
Flaw Summary:

A double-free in /epan/dissectors/packet-kafka.c's lz4 decompression functionality allowed for a crash of wireshark when processing a specially crafted packet. This could result in a temporary denial of service.

Comment 6 Product Security DevOps Team 2020-08-18 21:15:32 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-17498


Note You need to log in before you can comment on or make changes to this bug.