Wireshark-bugs: [Wireshark-bugs] [Bug 12659] New: Fuzzed PCAP causing long runtime in dissect_op
Date: Mon, 25 Jul 2016 06:44:12 +0000
Bug ID | 12659 |
---|---|
Summary | Fuzzed PCAP causing long runtime in dissect_openflow_v5 |
Product | Wireshark |
Version | 2.0.2 |
Hardware | x86 |
OS | Ubuntu |
Status | UNCONFIRMED |
Severity | Major |
Priority | Low |
Component | Dissection engine (libwireshark) |
Assignee | [email protected] |
Reporter | [email protected] |
Created attachment 14757 [details] Sample PCAP Build Information: TShark (Wireshark) 2.0.2 (SVN Rev Unknown from unknown) Copyright 1998-2016 Gerald Combs <[email protected]> and contributors. License GPLv2+: GNU GPL version 2 or later <http://www.gnu.org/licenses/old-licenses/gpl-2.0.html> This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. Compiled (64-bit) with libpcap, with POSIX capabilities (Linux), with libnl 3, with libz 1.2.8, with GLib 2.48.0, with SMI 0.4.8, with c-ares 1.10.0, with Lua 5.2, with GnuTLS 3.4.10, with Gcrypt 1.6.5, with MIT Kerberos, with GeoIP. Running on Linux 4.4.0-22-generic, with locale en_GB.UTF-8, with libpcap version 1.7.4, with libz 1.2.8, with GnuTLS 3.4.10, with Gcrypt 1.6.5. Intel Core Processor (Haswell) (with SSE4.2) Built using gcc 5.3.1 20160407. -- Fuzzed PCAP takes 100% CPU and runs for a long time on tshark 2.0.2 and a recent build from repository ( commit 688d055acd523e645c1e87267dcf4a0a9867adbd ). GDB backtrace from 'tshark -2 -V -r <pcap>' aborted after running for a while: Program received signal SIGABRT, Aborted. 0x00007ffff3cc483a in proto_tree_add_item_new (tree=0x0, hfinfo=0x7ffff6eacae8 <hf.16733+27208>, tvb=0x848630, start=42, length=2, encoding=0) at proto.c:2491 2491 get_hfi_length(hfinfo, tvb, start, &length, &item_length); 123 tomb gdb execution "thread apply all bt" 321 Thread 1 (Thread 0x7ffff7fb9740 (LWP 21376)): #0 0x00007ffff3cc483a in proto_tree_add_item_new (tree=0x0, hfinfo=0x7ffff6eacae8 <hf.16733+27208>, tvb=0x848630, start=42, length=2, encoding=0) at proto.c:2491 #1 0x00007ffff3cc4bde in proto_tree_add_item (tree=0x0, hfindex=98557, tvb=0x848630, start=42, length=2, encoding=0) at proto.c:2509 #2 0x00007ffff44e6469 in dissect_openflow_tablemod_prop_v5 (tvb=0x848630, pinfo=0xb04c18, tree=0x0, offset=42, length=4910) at packet-openflow_v5.c:3368 #3 0x00007ffff44e8c11 in dissect_openflow_table_desc_v5 (tvb=0x848630, pinfo=0xb04c18, tree=0x0, offset=40, length=4910) at packet-openflow_v5.c:4400 #4 0x00007ffff44eb704 in dissect_openflow_multipart_reply_v5 (tvb=0x848630, pinfo=0xb04c18, tree=0x0, offset=32, length=4910) at packet-openflow_v5.c:5304 #5 0x00007ffff44ecc41 in dissect_openflow_message_v5 (tvb=0x848630, pinfo=0xb04c18, tree=0x0, offset=8) at packet-openflow_v5.c:5902 #6 0x00007ffff44ece99 in dissect_openflow_v5 (tvb=0x848630, pinfo=0xb04c18, tree=0x0, data="" at packet-openflow_v5.c:5968 #7 0x00007ffff3caa711 in call_dissector_through_handle (handle=0x7fffedb032e0, tvb=0x848630, pinfo=0xb04c18, tree=0x0, data="" at packet.c:660 #8 0x00007ffff3caa8a2 in call_dissector_work (handle=0x7fffedb032e0, tvb=0x848630, pinfo_arg=0xb04c18, tree=0x0, add_proto_name=1, data="" at packet.c:735 #9 0x00007ffff3cadd25 in call_dissector_only (handle=0x7fffedb032e0, tvb=0x848630, pinfo=0xb04c18, tree=0x0, data="" at packet.c:2791 #10 0x00007ffff3cadd68 in call_dissector_with_data (handle=0x7fffedb032e0, tvb=0x848630, pinfo=0xb04c18, tree=0x0, data="" at packet.c:2804 #11 0x00007ffff3cade15 in call_dissector (handle=0x7fffedb032e0, tvb=0x848630, pinfo=0xb04c18, tree=0x0) at packet.c:2821 #12 0x00007ffff44d5730 in dissect_openflow_tcp_pdu (tvb=0x848630, pinfo=0xb04c18, tree=0x0, data="" at packet-openflow.c:98 #13 0x00007ffff4781ac0 in tcp_dissect_pdus (tvb=0x8485e0, pinfo=0xb04c18, tree=0x0, proto_desegment=1, fixed_len=8, get_pdu_len=0x7ffff44d5634 <get_openflow_pdu_length>, dissect_pdu=0x7ffff44d5664 <dissect_openflow_tcp_pdu>, dissector_data=0x7fffffffc400) at packet-tcp.c:3120 #14 0x00007ffff44d57ce in dissect_openflow (tvb=0x8485e0, pinfo=0xb04c18, tree=0x0, data="" at packet-openflow.c:112 #15 0x00007ffff44d588c in dissect_openflow_heur (tvb=0x8485e0, pinfo=0xb04c18, tree=0x0, data="" at packet-openflow.c:133 #16 0x00007ffff3cad3f3 in dissector_try_heuristic (sub_dissectors=0x915e20, tvb=0x8485e0, pinfo=0xb04c18, tree=0x0, heur_dtbl_entry=0x7fffffffbfb8, data="" at packet.c:2417 #17 0x00007ffff4786941 in decode_tcp_ports (tvb=0x848590, offset=32, pinfo=0xb04c18, tree=0x0, src_port=36547, dst_port=6633, tcpd=0x7fffeca6b770, tcpinfo=0x7fffffffc400) at packet-tcp.c:5052 #18 0x00007ffff4786c16 in process_tcp_payload (tvb=0x848590, offset=32, pinfo=0xb04c18, tree=0x0, tcp_tree=0x0, src_port=36547, dst_port=6633, seq=0, nxtseq=0, is_tcp_segment=0, tcpd=0x7fffeca6b770, tcpinfo=0x7fffffffc400) at packet-tcp.c:5098 #19 0x00007ffff4780efd in desegment_tcp (tvb=0x848590, pinfo=0xb04c18, offset=32, seq=1, nxtseq=11837, sport=36547, dport=6633, tree=0x0, tcp_tree=0x0, tcpd=0x7fffeca6b770, tcpinfo=0x7fffffffc400) at packet-tcp.c:2632 #20 0x00007ffff4786e67 in dissect_tcp_payload (tvb=0x848590, pinfo=0xb04c18, offset=32, seq=1, nxtseq=11837, sport=36547, dport=6633, tree=0x0, tcp_tree=0x0, tcpd=0x7fffeca6b770, tcpinfo=0x7fffffffc400) at packet-tcp.c:5165 #21 0x00007ffff478a75b in dissect_tcp (tvb=0x848590, pinfo=0xb04c18, tree=0x0, data="" at packet-tcp.c:6077 #22 0x00007ffff3caa711 in call_dissector_through_handle (handle=0x7fffedb110e0, tvb=0x848590, pinfo=0xb04c18, tree=0x0, data="" at packet.c:660 #23 0x00007ffff3caa8a2 in call_dissector_work (handle=0x7fffedb110e0, tvb=0x848590, pinfo_arg=0xb04c18, tree=0x0, add_proto_name=1, data="" at packet.c:735 #24 0x00007ffff3cab583 in dissector_try_uint_new (sub_dissectors=0x7b1cc0, uint_val=6, tvb=0x848590, pinfo=0xb04c18, tree=0x0, add_proto_name=1, data="" at packet.c:1199 #25 0x00007ffff425e409 in ip_try_dissect (heur_first=0, tvb=0x848590, pinfo=0xb04c18, tree=0x0, iph=0x7fffec869030) at packet-ip.c:1977 #26 0x00007ffff426037c in dissect_ip_v4 (tvb=0x848540, pinfo=0xb04c18, parent_tree=0x0, data="" at packet-ip.c:2476 #27 0x00007ffff3caa711 in call_dissector_through_handle (handle=0x7fffedb78930, tvb=0x848540, pinfo=0xb04c18, tree=0x0, data="" at packet.c:660 #28 0x00007ffff3caa8a2 in call_dissector_work (handle=0x7fffedb78930, tvb=0x848540, pinfo_arg=0xb04c18, tree=0x0, add_proto_name=1, data="" at packet.c:735 #29 0x00007ffff3cab583 in dissector_try_uint_new (sub_dissectors=0x73c040, uint_val=2048, tvb=0x848540, pinfo=0xb04c18, tree=0x0, add_proto_name=1, data="" at packet.c:1199 #30 0x00007ffff3cab5e4 in dissector_try_uint (sub_dissectors=0x73c040, uint_val=2048, tvb=0x848540, pinfo=0xb04c18, tree=0x0) at packet.c:1225 #31 0x00007ffff40a1c60 in dissect_ethertype (tvb=0xb03cc0, pinfo=0xb04c18, tree=0x0, data="" at packet-ethertype.c:262 #32 0x00007ffff3caa711 in call_dissector_through_handle (handle=0x7fffeda50000, tvb=0xb03cc0, pinfo=0xb04c18, tree=0x0, data="" at packet.c:660 #33 0x00007ffff3caa8a2 in call_dissector_work (handle=0x7fffeda50000, tvb=0xb03cc0, pinfo_arg=0xb04c18, tree=0x0, add_proto_name=1, data="" at packet.c:735 #34 0x00007ffff3cadd25 in call_dissector_only (handle=0x7fffeda50000, tvb=0xb03cc0, pinfo=0xb04c18, tree=0x0, data="" at packet.c:2791 #35 0x00007ffff3cadd68 in call_dissector_with_data (handle=0x7fffeda50000, tvb=0xb03cc0, pinfo=0xb04c18, tree=0x0, data="" at packet.c:2804 #36 0x00007ffff40a04d5 in dissect_eth_common (tvb=0xb03cc0, pinfo=0xb04c18, parent_tree=0x0, fcs_len=-1) at packet-eth.c:540 #37 0x00007ffff40a106b in dissect_eth (tvb=0xb03cc0, pinfo=0xb04c18, tree=0x0, data="" at packet-eth.c:836 #38 0x00007ffff3caa711 in call_dissector_through_handle (handle=0x7fffedb5c7a0, tvb=0xb03cc0, pinfo=0xb04c18, tree=0x0, data="" at packet.c:660 #39 0x00007ffff3caa8a2 in call_dissector_work (handle=0x7fffedb5c7a0, tvb=0xb03cc0, pinfo_arg=0xb04c18, tree=0x0, add_proto_name=1, data="" at packet.c:735 #40 0x00007ffff3cab583 in dissector_try_uint_new (sub_dissectors=0x73c2c0, uint_val=1, tvb=0xb03cc0, pinfo=0xb04c18, tree=0x0, add_proto_name=1, data="" at packet.c:1199 #41 0x00007ffff40e9887 in dissect_frame (tvb=0xb03cc0, pinfo=0xb04c18, parent_tree=0x0, data="" at packet-frame.c:507 #42 0x00007ffff3caa711 in call_dissector_through_handle (handle=0x7fffeda51950, tvb=0xb03cc0, pinfo=0xb04c18, tree=0x0, data="" at packet.c:660 #43 0x00007ffff3caa8a2 in call_dissector_work (handle=0x7fffeda51950, tvb=0xb03cc0, pinfo_arg=0xb04c18, tree=0x0, add_proto_name=1, data="" at packet.c:735 #44 0x00007ffff3cadd25 in call_dissector_only (handle=0x7fffeda51950, tvb=0xb03cc0, pinfo=0xb04c18, tree=0x0, data="" at packet.c:2791 #45 0x00007ffff3cadd68 in call_dissector_with_data (handle=0x7fffeda51950, tvb=0xb03cc0, pinfo=0xb04c18, tree=0x0, data="" at packet.c:2804 #46 0x00007ffff3caa079 in dissect_record (edt=0xb04c00, file_type_subtype=1, phdr=0xad68f0, tvb=0xb03cc0, fd=0x7fffffffd510, cinfo=0x0) at packet.c:543 #47 0x00007ffff3c9ebf9 in epan_dissect_run (edt=0xb04c00, file_type_subtype=1, phdr=0xad68f0, tvb=0xb03cc0, fd=0x7fffffffd510, cinfo=0x0) at epan.c:365 #48 0x000000000041844c in process_packet_first_pass (cf=0x64f100 <cfile>, edt=0xb04c00, offset=24, whdr=0xad68f0, pd=0xb04e20 "") at tshark.c:2694 #49 0x0000000000418dd7 in load_cap_file (cf=0x64f100 <cfile>, save_file=0x0, out_file_type=2, out_file_name_res=0, max_packet_count=0, max_byte_count=0) at tshark.c:2988 #50 0x0000000000416fa0 in main (argc=5, argv=0x7fffffffdd68) at tshark.c:1873
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- [Wireshark-bugs] [Bug 12659] Fuzzed PCAP causing long runtime in dissect_openflow_v5
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 12659] Fuzzed PCAP causing long runtime in dissect_openflow_v5
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 12659] Fuzzed PCAP causing long runtime in dissect_openflow_v5
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 12659] Fuzzed PCAP causing long runtime in dissect_openflow_v5
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 12659] Fuzzed PCAP causing long runtime in dissect_openflow_v5
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 12659] Fuzzed PCAP causing long runtime in dissect_openflow_v5
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 12659] Fuzzed PCAP causing long runtime in dissect_openflow_v5
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 12659] Fuzzed PCAP causing long runtime in dissect_openflow_v5
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 12659] Fuzzed PCAP causing long runtime in dissect_openflow_v5
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 12659] Fuzzed PCAP causing long runtime in dissect_openflow_v5
- Prev by Date: [Wireshark-bugs] [Bug 12623] Add vSocket dissector support
- Next by Date: [Wireshark-bugs] [Bug 12659] Fuzzed PCAP causing long runtime in dissect_openflow_v5
- Previous by thread: [Wireshark-bugs] [Bug 12658] Buildbot crash output: fuzz-2016-07-24-20329.pcap
- Next by thread: [Wireshark-bugs] [Bug 12659] Fuzzed PCAP causing long runtime in dissect_openflow_v5
- Index(es):