Wireshark-bugs: [Wireshark-bugs] [Bug 9761] New: Read Access Violation near NULL starting
Bug ID |
9761
|
Summary |
Read Access Violation near NULL starting
|
Classification |
Unclassified
|
Product |
Wireshark
|
Version |
1.10.5
|
Hardware |
x86-64
|
OS |
Windows 8
|
Status |
UNCONFIRMED
|
Severity |
Critical
|
Priority |
Low
|
Component |
Wireshark
|
Assignee |
bugzilla-admin@wireshark.org
|
Reporter |
osanda@unseen.is
|
Build Information:
wireshark 1.10.5 (SVNRev 54262 from /trunk-1.10)
Copyright 1998-2013 Gerald Combs <gerald@wireshark.org> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (32-bit) with GTK+ 2.24.14, with Cairo 1.10.2, with Pango 1.30.1, with
GLib 2.34.1, with WinPcap (4_1_3), with libz 1.2.5, without POSIX capabilities,
without libnl, with SMI 0.4.8, with c-ares 1.9.1, with Lua 5.1, without Python,
with GnuTLS 2.12.18, with Gcrypt 1.4.6, with MIT Kerberos, with GeoIP, with
PortAudio V19-devel (built Dec 19 2013), with AirPcap.
Running on 64-bit Windows 8, build 9200, with WinPcap version 4.1.3 (packet.dll
version 4.1.0.2980), based on libpcap version 1.0 branch 1_0_rel0b (20091008),
GnuTLS 2.12.18, Gcrypt 1.4.6, without AirPcap.
Intel(R) Core(TM) i7-3630QM CPU @ 2.40GHz, with 12240MB of physical
memory.
Built using Microsoft Visual C++ 10.0 build 40219
--
Paste 50000 A chars in the filter input box and it will cause a crash. Tested
on x64 and 32 bit versions.
(ee0.710): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\Program Files (x86)\Wireshark32\libcairo-2.dll -
eax=00000000 ebx=04b383f0 ecx=77a12ad2 edx=63d7c6e0 esi=00000000 edi=63d7c6e0
eip=63d11737 esp=0018dd60 ebp=00000000 iopl=0 nv up ei pl nz na pe nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210206
libcairo_2!cairo_image_surface_get_data+0x7:
63d11737 8138609dd763 cmp dword ptr [eax],offset
libcairo_2!cairo_tee_surface_index+0xd080 (63d79d60) ds:002b:00000000=????????
0:000> !exploitable
!exploitable 1.6.0.0
Exploitability Classification: PROBABLY_NOT_EXPLOITABLE
Recommended Bug Title: Read Access Violation near NULL starting at
libcairo_2!cairo_image_surface_get_data+0x0000000000000007
(Hash=0xc13b8603.0x3eca6f5e)
This is a user mode read access violation near null, and is probably not
exploitable.
You are receiving this mail because:
- You are watching all bug changes.