CVE-2020-28030
📋 TL;DR
This vulnerability in Wireshark's GQUIC protocol dissector allows attackers to cause a denial-of-service crash by sending specially crafted network packets. It affects Wireshark users analyzing network traffic, particularly security analysts and network administrators. The crash occurs when parsing malformed GQUIC packets due to incorrect offset advancement.
💻 Affected Systems
- Wireshark
📦 What is this software?
Fedora by Fedoraproject
Fedora by Fedoraproject
Wireshark by Wireshark
⚠️ Risk & Real-World Impact
Worst Case
Complete Wireshark application crash leading to loss of captured network data and disruption of network analysis activities.
Likely Case
Application crash when analyzing malicious or malformed GQUIC network traffic, requiring restart of Wireshark.
If Mitigated
No impact if Wireshark is not used to analyze GQUIC traffic or if patched version is installed.
🎯 Exploit Status
Exploitation requires sending malformed GQUIC packets that the target analyzes with Wireshark; no authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Wireshark 3.2.8 and later
Vendor Advisory: https://www.wireshark.org/security/wnpa-sec-2020-15.html
Restart Required: Yes
Instructions:
1. Download latest Wireshark from wireshark.org 2. Install over existing version 3. Restart Wireshark and any related services
🔧 Temporary Workarounds
Disable GQUIC dissector
allPrevent Wireshark from parsing GQUIC traffic by disabling the dissector
Edit -> Preferences -> Protocols -> GQUIC -> Uncheck 'Enable GQUIC protocol'
Use capture filters
allFilter out GQUIC traffic during capture to avoid processing
Use capture filter: not port 443 or not udp port 443
🧯 If You Can't Patch
- Avoid analyzing unknown or untrusted network traffic with vulnerable Wireshark versions
- Use network segmentation to limit exposure to potentially malicious GQUIC traffic
🔍 How to Verify
Check if Vulnerable:
Check Wireshark version: Help -> About Wireshark. If version is between 3.2.0 and 3.2.7, you are vulnerable.
Check Version:
wireshark -v | grep 'Wireshark'
Verify Fix Applied:
Verify version is 3.2.8 or higher in Help -> About Wireshark, then test with sample GQUIC traffic.
📡 Detection & Monitoring
Log Indicators:
- Wireshark crash logs
- Application error events showing Wireshark termination
Network Indicators:
- Malformed GQUIC packets on network
- Unexpected GQUIC traffic to analysis systems
SIEM Query:
source="wireshark" AND (event_type="crash" OR severity="critical")
🔗 References
- https://gitlab.com/wireshark/wireshark/-/commit/b287e7165e8aa89cde6ae37e7c257c5d87d16b9b
- https://gitlab.com/wireshark/wireshark/-/issues/16887
- https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHZSVK7PO2LTGFQXFHFXY6SOMSQ7UPRS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2667E6WKVE56G66BVBVD7LJPIDOJ7K3/
- https://www.wireshark.org/security/wnpa-sec-2020-15.html
- https://gitlab.com/wireshark/wireshark/-/commit/b287e7165e8aa89cde6ae37e7c257c5d87d16b9b
- https://gitlab.com/wireshark/wireshark/-/issues/16887
- https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHZSVK7PO2LTGFQXFHFXY6SOMSQ7UPRS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2667E6WKVE56G66BVBVD7LJPIDOJ7K3/
- https://www.wireshark.org/security/wnpa-sec-2020-15.html