The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14295 | issue tracking |
https://code.wireshark.org/review/#/c/24997/ | patch issue tracking |
https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html | third party advisory mailing list |
http://www.securityfocus.com/bid/102311 | third party advisory vdb entry |
https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=137ab7d5681486c6d6cc8faac4300b7cd4ec0cf1 |