vendor:
Wireshark
by:
Google Security Research
7,5
CVSS
HIGH
Use-After-Free
416
CWE
Product Name: Wireshark
Affected Version From: Current git master
Affected Version To: Current git master
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2020
Use-After-Free Condition in Wireshark
A use-after-free condition can be observed in an ASAN build of Wireshark (current git master), by feeding a malformed file to tshark. The crash occurs due to a use-after-free condition in wtap_optionblock_free wireshark/wiretap/wtap_opttypes.c:161:20. The 0x60400009d960 is located 16 bytes inside of 40-byte region [0x60400009d950,0x60400009d978) which was previously allocated by thread T0 and freed by thread T0. Shadow bytes around the buggy address show that the memory was freed.
Mitigation:
Developers should ensure that memory is not freed twice and that memory is not accessed after it has been freed.