wireshark/fuzzshark_ip_proto-udp: Heap-buffer-overflow in g_strdup

2017-11-18T08:15:41
ID OSSFUZZ-4311
Type ossfuzz
Reporter Google
Modified 2018-05-27T02:56:56

Description

Detailed report: https://oss-fuzz.com/testcase?key=4854848580222976

Project: wireshark Fuzzer: libFuzzer_wireshark_fuzzshark_ip_proto-udp Fuzz target binary: fuzzshark_ip_proto-udp Job Type: libfuzzer_asan_wireshark Platform Id: linux

Crash Type: Heap-buffer-overflow READ 1 Crash Address: 0x603000162291 Crash State: g_strdup string_fvalue_set_string proto_tree_add_string

Sanitizer: address (ASAN)

Recommended Security Severity: Medium

Reproducer Testcase: https://oss-fuzz.com/download?testcase_id=4854848580222976

Issue filed automatically.

See https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md for more information.

<b>Note: This crash might not be reproducible with the provided testcase. That said, for the past 14 days we've been seeing this crash frequently. If you are unable to reproduce this, please try a speculative fix based on the crash stacktrace in the report. The fix can be verified by looking at the crash statistics in the report, a day after the fix is deployed. We will auto-close the bug if the crash is not seen for 14 days.</b>

This bug is subject to a 90 day disclosure deadline. If 90 days elapse without an upstream patch, then the bug report will automatically become visible to the public.

When you fix this bug, please * mention the fix revision(s). * state whether the bug was a short-lived regression or an old bug in any stable releases. * add any other useful information. This information can help downstream consumers.

If you have questions for the OSS-Fuzz team, please file an issue at https://github.com/google/oss-fuzz/issues.