https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16465
Bug ID: 16465
Summary: Signed Overflow in ber_open
Product: Wireshark
Version: Git
Hardware: x86
OS: Linux
Status: UNCONFIRMED
Severity: Major
Priority: Low
Component: Capture file support (libwiretap)
Assignee: bugzilla-ad...@wireshark.org
Reporter: fabien.lheur...@trust-in-soft.com
Target Milestone: ---
Created attachment 17701
--> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=17701&action=edit
This pcap file was generated by AFL and should allow to reproduce the issue
Build Information:
Paste the COMPLETE build information from "Help->About Wireshark", "wireshark
-v", or "tshark -v".
--
## Analysis Context
*The verification was performed with TrustInSoft Analyzer, a formal
static analyzer for C and C++.*
*The result is part of a larger security assessment performed by
TrustInSoft for* ***Naval Group***.
The analysis of wireshark was performed in the following environment:
----------------- ----------------------------------------------
Platform Ubuntu Linux 18.04
Tool TrustInSoft Analyzer, a formal static analyzer
Input Files Fuzzing of 10 000 pcap file using AFL
Verification Analysis of `process_cap_file` with the AFL corpus
------------- ----------------------------------------------
------------ ------------------- ---------------------- ----------------
Wireshark version v2.6.16rc0 git commit dcd65a4012
https://github.com/wireshark/wireshark.git
glib version 2.62.6 git commit eb0f73a39
https://github.com/GNOME/glib.git
libgcrypt version 1.8.5 git commit ada758e3
https://github.com/gpg/libgcrypt.git
libgpg-error version 1.37 git commit 85b5006
https://github.com/gpg/libgpg-error.git
libpcap version 1.9.1 git commit 1547215c
https://github.com/the-tcpdump-group/libpcap.git
pcre version 8.43-RC1 git commit 10e4adb
https://github.com/svn2github/pcre.git
pcre2 version 10.10 git commit a677f5b
https://github.com/luvit/pcre2.git
zlib version 10.10 git commit a677f5b
https://github.com/madler/zlib.git
------------ ------------------- ---------------------- ----------------
- valgrind is deactivated in glib
- PCRE library is deactivated in glib
- `cap_files_hashes` is deactivated in wireshark
## Signed Overflow in *ber_open*
In the function `ber_open`, there is a signed overflow in the
computation of `len<<8` when, for example, `len` is equal to
`12825271`.
File: wireshark/wiretap/ber.c
```c
while(i--) {
oct = bytes[offset++];
len = (len<<8) + oct;
}
```
Indeed, the values of `bytes` are:
```
bytes[0] ∈ {162}
[1] ∈ {132}
[2] ∈ {255}
[3] ∈ {13}
[4..5] ∈ {255}
[6] ∈ {132}
[7] ∈ {255}
```
Thus, on the 4th iteration of the loop, `len` is equal to `16715263`,
and when shifted by `8`, there is a signed overflow.
--
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via: Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives: https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe