BF Specification of CVE-2013-4934 Wireshark v1.8.x before v1.8.9 and v1.10.x before v1.10.1

Missing direct initialization of the 'netmon->frame_table' pointer to NULL leads to a wild pointer, which, when used for explicit deallocation of its object on the heap leads to a double deallocate (double free). If exploited, this can lead to denial of service (DOS) and more specifically application crash-- availability loss.

vendor:product: wireshark:wireshark:1.8.0

Bug Report

Code with Bug
Code with Bug1

Code with Fix
Code with Fix1

NVD Entry

MADMemory Addressing (MAD) class – The pointer to an object is initialized, repositioned, or reassigned to an improper memory address.
MMNMemory Management (MMN) class – An object is allocated, deallocated, or resized improperly.
Initialize PointerInitialize Pointer operation – Change the undefined data value of a pointer to a meaningful object address; and position the pointer at the start of the object.
DeallocateDeallocate operation – Release the allocated memory of an object.
Code BugCode Bug type – Defect in the implementation of the operation – proper operands over an improper operation. A first cause for the chain of weaknesses underlying a software security vulnerability. Must be fixed to resolve the vulnerability.
   Missing CodeMissing Code bug - The operation is entirely absent.
Address Error/FaultAddress Fault/Error type – The object address in use is wrong.
   Wild PointerWild Pointer fault/error – Holds an arbitrary address, because it has not been initialized or an erroneous allocation routine is used.
Memory Corruption/Disclosure Final ErrorMemory Corruption/Disclosure exploitable error type – An exploitable or undefined system behavior caused by memory addressing, allocation, use, and deallocation bugs.
   Double DeallocateDouble Deallocate exploitable error – An attempt to deallocate a deallocated (freed) object or via an uninitialized pointer.
Operation AttributeDefinition
MechanismMechanism operation attribute type – Shows how the operation code is performed.
   DirectDirect operation attribute – The operation is on a particular object element.
   ExplicitExplicit operation attribute – The operation is via a function/method call.
Source CodeSource Code operation attribute type – Shows where the operation code is in software or firmware.
   CodebaseCodebase operation attribute – The operation is in the programmer's code - in the application itself.
Execution SpaceExecution Space operation attribute type – Shows where the operation code is running or with what privilege level.
   UserlandUserland operation attribute – The bugged code runs in an environment with privilege levels, but in unprivileged mode (e.g., ring 3 in x86 architecture).
Operand AttributeDefinition
Address StateAddress State operand attribute type - Shows where the address is in the memory layout.
   HeapHeap operand attribute – The object is a dynamically allocated data structure (e.g., via malloc() and new).
Size KindSize Kind operand attribute type – Shows the object's limit for traversal.
   UsedUsed operand attribute – A supplied size for an object.