wireshark/fuzzshark_ip_proto-udp: Heap-buffer-overflow in get_t61_string

Type ossfuzz
Reporter Google
Modified 2017-12-29T14:05:20


Detailed report: https://oss-fuzz.com/testcase?key=5410211289366528

Project: wireshark Fuzzer: libFuzzer_wireshark_fuzzshark_ip_proto-udp Fuzz target binary: fuzzshark_ip_proto-udp Job Type: libfuzzer_asan_wireshark Platform Id: linux

Crash Type: Heap-buffer-overflow READ 1 Crash Address: 0x619000790d80 Crash State: get_t61_string proto_tree_new_item proto_tree_add_item_new

Sanitizer: address (ASAN)

Recommended Security Severity: Medium

Reproducer Testcase: https://oss-fuzz.com/download?testcase_id=5410211289366528

Issue filed automatically.

See https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md for more information.

<b>Note: This crash might not be reproducible with the provided testcase. That said, for the past 14 days we've been seeing this crash frequently. If you are unable to reproduce this, please try a speculative fix based on the crash stacktrace in the report. The fix can be verified by looking at the crash statistics in the report, a day after the fix is deployed. We will auto-close the bug if the crash is not seen for 14 days.</b>

This bug is subject to a 90 day disclosure deadline. If 90 days elapse without an upstream patch, then the bug report will automatically become visible to the public.

When you fix this bug, please * mention the fix revision(s). * state whether the bug was a short-lived regression or an old bug in any stable releases. * add any other useful information. This information can help downstream consumers.

If you have questions for the OSS-Fuzz team, please file an issue at https://github.com/google/oss-fuzz/issues.