Wireshark Endace ERF unsigned integer wrap vulnerability

2009-10-05T00:00:00
ID VU:676492
Type cert
Reporter CERT
Modified 2009-11-24T00:00:00

Description

Overview

Wireshark contains an unsigned integer wrap vulnerability that may occur when parsing Endace Extensible Record Format (ERF) files.

Description

Wireshark is a protocol analyzer that can open or import previously saved files. When processing an Endace ERF file an unsigned integer wrap vulnerability may cause Wireshark to allocate a very large buffer. To exploit this issue, an attacker would have to convince a user to open a crafted ERF file using Wireshark.

This issue also affects Tshark, the console version of Wireshark.


Impact

A remote attacker can cause Wireshark to crash. It may be possible, although unlikely, for an attacker to execute arbitrary code. Exploiting the vulnerability could result in a NULL pointer dereference, which can lead to code execution on certain platforms.


Solution

Update
Wireshark 1.2.2 has been released to address this and other issues.


Do not run Wireshark with root or administrator privileges

Running Wireshark with a limited user account will reduce the impact of this and other vulnerabilities.


Systems Affected

Vendor| Status| Date Notified| Date Updated
---|---|---|---
Wireshark| | -| 05 Oct 2009
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A

References

  • <http://www.wireshark.org/docs/relnotes/wireshark-1.2.2.html>
  • http://anonsvn.wireshark.org/viewvc/trunk/wiretap/erf.c?view=markup&pathrev;=29364
  • <https://www.securecoding.cert.org/confluence/display/cplusplus/INT30-CPP.+Ensure+that+unsigned+integer+operations+do+not+wrap>
  • <http://wiki.wireshark.org/Security#head-ac69042aeeb98cdaed2ec2ff1bd2c983fa03cffd>
  • <http://xorl.wordpress.com/2009/11/10/cve-2009-3829-wireshark-endace-erf-protocol-integer-underflow/>
  • <http://www.juniper.net/solutions/literature/white_papers/Vector-Rewrite-Attack.pdf>

Credit

This issue was discovered by Ryan Giobbi.

This document was written by Ryan Giobbi and Art Manion.

Other Information

  • CVE IDs: Unknown
  • Date Public: 15 Sep 2009
  • Date First Published: 05 Oct 2009
  • Date Last Updated: 24 Nov 2009
  • Severity Metric: 1.28
  • Document Revision: 27