BF Specification of CVE-2013-4930 Wireshark v1.8.x before v1.8.9 and v1.10.x before v1.10.1

../../../../BF/images/BFVUL/CVE-2013-4930(simple)-0.png
Missing verification on the range for the user-controlled 'len_field' (0, but must be at least 1) results in a wrong value, which becomes a wrong argument for the subtraction ‘-‘ operator in 'len_field-1'. The result is -1 and the sign is flipped; as 'body_len' is unsigned integer, the ‘=’ operator coerces the passed-out result to a distorted value (UINT_MAX), which when used to allocate memory on the heap leads to memory overflow. If exploited, this can lead to denial of service – assertion failure and application exit.

//generated// Missing Code to Verify length (0, but must be at least 1) via Range (len_field must be at least 1) of Stored in Codebase (wireshark-1.8.0/epan/dissectors/packet-dvbci.c#L4044) Local leads to Wrong Value (’len_field’) , which propagates to Wrong Argument (in ‘*body_len = len_field-1;’) Operator Calculate (subtraction ‘-’) Bound (to body_len) Numeric (0) Primitive (guint32) Codebase (wireshark-1.8.0/epan/dissectors/packet-dvbci.c #L4044) in Local that results in Flipped Sign (as ‘(len_field-1)’ is -1,) , which propagates to Flipped Sign (in ‘*body_len = len_field-1;’,, where body_len is guint32, but is being assigned -1,) Pass Out Coerce (assignment ‘=’ operator) Bound (to body_len) Numeric (-1) Primitive Codebase (wireshark-1.8.0/epan/dissectors/packet-dvbci.c #L4044) in Local that results in Distorted Value (‘UINT_MAX’ (large positive integer)) , which propagates to Wrong Size (in ‘fd->data = g_malloc(fd->len);’ (‘fd->len’ set from ‘frag_data_len’ set from ‘body_len’)) Explicit Allocate (g_malloc()) Actual Userland in that results in Memory Overflow , which can be exploited toward Denial of Service (DOS) (availability loss) security failure.



vendor:product: wireshark:wireshark


Bug Report


Code with Fix


Code with Bug


NVD Entry

ClassDefinition
OperationDefinition
Cause/ConsequenceDefinition
Code BugCode Bug type – An error in the implementation of an operation – proper operands over an improper operation. It is the roor cause of a security vulnerability. Must be fixed to resolve the vulnerability.
   Missing CodeMissing Code bug - The operation is misplaced entirely absent.
Data Error/FaultData error (or fault) type – The data of an object has harmed semantics or inconsistent or wrong value.
   Wrong ValueWrong Value error (or fault) – The data value is not accurate (e.g., outside of a range).
   Wrong ArgumentWrong Argument error (or fault) – Inaccurate input data value, i.e., non-verified for harmed semantics.
   Flipped SignFlipped Sign error (or fault) – Sign bit is overwritten from type related calculation.
   Distorted ValueDistorted Value error (or fault) – The data value is incorrect (although is fits the type size) due to a sign flip or signed/unsigned or unsigned/signed cast.
   Wrong SizeWrong Size error (or fault) – The value used as size or length (i.e., the number of elements) does not match the object's memory size or length (e.g., to limit a pointer reposition or index increment/decrement in a repetition statement).
Memory Corruption/Disclosure Final ErrorMemory Corruption/Disclosure final error/exploit vector type – An exploitable or undefined system behavior caused by memory addressing, allocation, use, or deallocation bugs.
   Memory OverflowMemory Overflow final error – More memory is requested than available.
Operation AttributeDefinition
MechanismMechanism operation attribute type – Shows how the operation with a bug or faulty operand is performed.
   RangeRange operation attribute – The operation checks data are within a (min, max) interval.
   OperatorOperator operation attribute – The operation is via a function with a symbolic name that implements a mathematical, relational or logical operation.
   Pass OutPass Out operation attribute – The operation is via out or in/out arguments' values or a return value to a function/ operator.
   ExplicitExplicit operation attribute – The operation is via a function/method call.
Source CodeSource Code operation attribute type – Shows where the code of the operation with a bug or faulty operand resides within the software, firmware, or hardware.
   CodebaseCodebase operation attribute – The operation is in the programmer's code - in the application itself.
Execution SpaceExecution Space operation attribute type – Shows where the operation with a bug or faulty operand is executed and the privilege level at which it runs.
   LocalLocal operation attribute – The bugged code runs in an environment with access control policy with limited (local user) permission.
   UserlandUserland operation attribute – The bugged code runs in an environment with privilege levels, but in unprivileged mode (e.g., ring 3 in x86 architecture).
Operand AttributeDefinition
Data StateData State operand attribute type – Shows where the data comes from.
   StoredStored operand attribute – Data are from a permanent storage (e.g., file, database on a storage device); they are at rest.
Name StateName State operand attribute type – Shows what the stage of the entity name is.
   BoundBound operand attribute – The name is linked to a declared (or inferred) data type, a defined object's data, or a called function implementation.
Data KindData Kind operand attribute type – Shows what the type or category of data is.
   NumericNumeric operand attribute – A number – a sequence of digits.
Type KindType Kind operand attribute type – Shows what the data type composition is.
   PrimitivePrimitive operand attribute – A scalar data type that mimics the hardware units - e.g., int (long, short, signed), float, double, string, Boolean. A primitive data type is only language defined and is not built from other data types.
Size KindSize Kind operand attribute type – Shows what is used as the size or length (i.e., the number of elements) of an object - e.g., as the limit for traversal over the elements.
   UsedUsed operand attribute – A supplied value to be used as the size or length (i.e., the number of elements) of an object.