This is a static archive of our old Q&A Site. Please post any new questions and answers at ask.wireshark.org.

vulnerability CVE-2015-3182 Wireshark DEC DNA Routing Protocol Processing Error Lets Remote Users Deny Service

0

There is a vulnerability

Wireshark DEC DNA Routing Protocol Processing Error Lets Remote Users Deny Service

Security Tracker Alert ID: 1032279 Security Tracker URL: http://securitytracker.com/id/1032279

Fixes an update to 1.12.5 this vulnerability?

asked 26 May '15, 02:34

Sandy1972's gravatar image

Sandy1972
6112
accept rate: 0%


2 Answers:

0

Is it listed in the release notes?

answered 26 May '15, 07:31

Jaap's gravatar image

Jaap ♦
11.7k16101
accept rate: 14%

No, because we just found out about it now.

(26 May '15, 16:03) Guy Harris ♦♦

0

Their claim that 1.12.4 is vulnerable appears to be bul^Wincorrect.

The problem is due to a pointer-returning function not being properly declared, due to the header that declares it not being included, so that the compiler thinks the function returns an int, which it needs to widen to 64 bits on LP64 platforms, so the upper 32 bits of the pointer get chopped off and then either replaced by zeros (most 64-bit instruction sets) or replaced with the high-order bit of the lower 32 bits of the pointer (x86-64).

In 1.12.4, the DEC DNA Routing Protocol dissector does include the header in question.

In 1.10.x, it doesn't.

So the bug doesn't exist in 1.12.4, so there's nothing to fix in 1.12.5.

The bug does exist in 1.10.x, and should be fixed in the next 1.10.x release, which should be 1.10.15, and which has not yet been scheduled.

answered 26 May '15, 16:08

Guy%20Harris's gravatar image

Guy Harris ♦♦
17.4k335196
accept rate: 19%