An issue in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the packet-bgp.c, dissect_bgp_open(tvbuff_t*tvb, proto_tree*tree, packet_info*pinfo), optlen components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected.
The product performs a calculation to determine how much memory to allocate, but an integer overflow can occur that causes less memory to be allocated than expected, leading to a buffer overflow.
Link | Tags |
---|---|
https://github.com/wireshark/wireshark/commit/80a4dc55f4d2fa33c2b36a99406500726d3faaef | patch |
https://gitlab.com/wireshark/wireshark/-/issues/19347 | issue tracking vendor advisory |
https://gist.github.com/1047524396/e82c55147cd3cb62ef20cbdb0ec83694 | third party advisory |