A vulnerability in the Distributed Computing Environment/Remote Procedure Call Microsoft Spool Subsystem (DCERPC SPOOLSS) dissector component of Wireshark could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.
The vulnerability is due to insufficient boundary checks in the epan/dissectors/packet-dcerpc-spoolss.c source code file of the affected software. An attacker could exploit this vulnerability by injecting a malformed packet into a network to be processed by the affected software, or by convincing a user to open a malicious packet trace file. A successful exploit could cause a heap buffer out-of-bounds read condition, resulting in a DoS condition on the targeted system.
Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available.
Wireshark has confirmed the vulnerability and released software updates.