Blame SOURCES/wireshark-1.10.14-CVE-2018-14341.patch

a65ffb
diff --git a/epan/dissectors/packet-dcm.c b/epan/dissectors/packet-dcm.c
a65ffb
index 1dd8959..bcf613b 100644
a65ffb
--- a/epan/dissectors/packet-dcm.c
a65ffb
+++ b/epan/dissectors/packet-dcm.c
a65ffb
@@ -5697,6 +5697,10 @@ dissect_dcm_tag_value(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, dcm_s
a65ffb
     if (pdv->syntax == DCM_EBE)	is_little_endian = FALSE;
a65ffb
     else			is_little_endian = TRUE;
a65ffb
 
a65ffb
+    /* Make sure we have all the bytes of the item; this should throw
a65ffb
+       and exception if vl_max is so large that it causes the offset
a65ffb
+       to overflow. */
a65ffb
+    tvb_ensure_bytes_exist(tvb, offset, vl_max);
a65ffb
 
a65ffb
     /* ---------------------------------------------------------------------------
a65ffb
        Potentially long types. Obey vl_max