Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 7565] New: Capture file that crashes wireshark on packet-c

Date: Fri, 3 Aug 2012 04:19:19 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7565

           Summary: Capture file that crashes wireshark on
                    packet-cmip-template.c
           Product: Wireshark
           Version: 1.8.1
          Platform: x86
        OS/Version: All
            Status: NEW
          Severity: Critical
          Priority: Low
         Component: Wireshark
        AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
        ReportedBy: laurentb@xxxxxxxxx


Created attachment 8891
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=8891
capture triggering the crash

Build Information:
1.8.1
--
Hi,

Here is a PCAP file triggering a crash that could enable a remote party to
trigger (a least) a remote denial of service.

This was successfully tested on 1.8.1.

This file was generated thanks to a fuzz testing campaign.

Laurent Butti.

Program received signal SIGSEGV, Segmentation fault.
0x01010101 in proto_reg_handoff_cmip () at
../../asn1/cmip/packet-cmip-template.c:215
215     oid_add_from_string("2.9.3.2.3.1","managedObjectClass(3)
alarmRecord(1)");
(gdb) bt
#0  0x01010101 in proto_reg_handoff_cmip () at
../../asn1/cmip/packet-cmip-template.c:215
#1  0x240489ff in ?? ()
#2  0x7775d2e8 in ?? ()
#3  0x44838dff in ?? ()
#4  0x89ffa683 in ?? ()
#5  0x8d042444 in ?? ()
#6  0xa6604683 in ?? ()
#7  0x240489ff in ?? ()
#8  0x7775bae8 in ?? ()
#9  0x78838dff in ?? ()
#10 0x89ffa683 in ?? ()
#11 0x8d042444 in ?? ()
#12 0xa6605283 in ?? ()
#13 0x240489ff in ?? ()
#14 0x7775a2e8 in ?? ()
#15 0xa0838dff in ?? ()
#16 0x89ffa683 in ?? ()
#17 0x8d042444 in ?? ()
#18 0xa6605e83 in ?? ()
#19 0x240489ff in ?? ()
#20 0x77758ae8 in ?? ()
#21 0xd8838dff in ?? ()
#22 0x89ffa683 in ?? ()
---Type <return> to continue, or q <return> to quit---
#23 0x8d042444 in ?? ()
#24 0xa6606a83 in ?? ()
#25 0x240489ff in ?? ()
#26 0x777572e8 in ?? ()
#27 0x76838dff in ?? ()
#28 0x89ffa660 in ?? ()
#29 0x8d042444 in ?? ()
#30 0xa6609383 in ?? ()
#31 0x240489ff in ?? ()
#32 0x77755ae8 in ?? ()
#33 0x00838dff in dissect_amqp_0_9_method_access_request (tvb=0x89ffa683,
pinfo=0x8d042444, tree=Cannot access memory at address 0xa6603a93
) at packet-amqp.c:6818
#34 dissect_amqp_0_9_frame (tvb=0x89ffa683, pinfo=0x8d042444, tree=Cannot
access memory at address 0xa6603a93
) at packet-amqp.c:5926
Cannot access memory at address 0xa6603a87

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.