CVE-2021-39920
📋 TL;DR
A NULL pointer dereference vulnerability in Wireshark's IPPUSB dissector allows attackers to cause denial of service via specially crafted network packets or capture files. This affects Wireshark users analyzing network traffic, particularly those processing untrusted data. The vulnerability can crash Wireshark but doesn't allow arbitrary code execution.
💻 Affected Systems
- Wireshark
📦 What is this software?
Fedora by Fedoraproject
Fedora by Fedoraproject
Wireshark by Wireshark
⚠️ Risk & Real-World Impact
Worst Case
Wireshark crashes when processing malicious packets or capture files, disrupting network analysis activities and potentially causing data loss if unsaved work is present.
Likely Case
Wireshark crashes when analyzing malicious network traffic or opening crafted capture files, requiring restart of the application.
If Mitigated
No impact if Wireshark is not used or if patched versions are deployed.
🎯 Exploit Status
Exploitation requires sending malicious packets on a network being monitored or providing a crafted capture file. No authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.4.10 and later
Vendor Advisory: https://www.wireshark.org/security/wnpa-sec-2021-12.html
Restart Required: Yes
Instructions:
1. Download Wireshark 3.4.10 or later from wireshark.org. 2. Install the update following platform-specific instructions. 3. Restart Wireshark after installation.
🔧 Temporary Workarounds
Disable IPPUSB dissector
allPrevent Wireshark from processing IPPUSB protocol traffic
Edit preferences -> Protocols -> IPPUSB -> Uncheck 'Enable IPPUSB protocol'
Use capture filters
allFilter out IPPUSB traffic during capture
Use capture filter: not usb
🧯 If You Can't Patch
- Avoid analyzing untrusted network traffic or capture files
- Run Wireshark in isolated environments or virtual machines
🔍 How to Verify
Check if Vulnerable:
Check Wireshark version via Help -> About Wireshark. If version is between 3.4.0 and 3.4.9 inclusive, you are vulnerable.
Check Version:
wireshark --version
Verify Fix Applied:
Verify Wireshark version is 3.4.10 or later. Test with known malicious IPPUSB capture files to ensure no crash occurs.
📡 Detection & Monitoring
Log Indicators:
- Wireshark crash logs, application termination events
Network Indicators:
- Malformed IPPUSB packets, unusual USB traffic patterns
SIEM Query:
EventID: 1000 Application Error for wireshark.exe OR Process Name: wireshark AND Termination Reason: Exception
🔗 References
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39920.json
- https://gitlab.com/wireshark/wireshark/-/issues/17705
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A6AJFIYIHS3TYDD2EBYBJ5KKE52X34BJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YEWTIRMC2MFQBZ2O5M4CJHJM4JPBHLXH/
- https://security.gentoo.org/glsa/202210-04
- https://www.debian.org/security/2021/dsa-5019
- https://www.wireshark.org/security/wnpa-sec-2021-15.html
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39920.json
- https://gitlab.com/wireshark/wireshark/-/issues/17705
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A6AJFIYIHS3TYDD2EBYBJ5KKE52X34BJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YEWTIRMC2MFQBZ2O5M4CJHJM4JPBHLXH/
- https://security.gentoo.org/glsa/202210-04
- https://www.debian.org/security/2021/dsa-5019
- https://www.wireshark.org/security/wnpa-sec-2021-15.html