Stack consumption vulnerability in the dissect_ber_choice function in the BER dissector in Wireshark 1.2.x through 1.2.15 and 1.4.x through 1.4.4 might allow remote attackers to cause a denial of service (infinite loop) via vectors involving self-referential ASN.1 CHOICE values.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wireshark | Wireshark | 1.2.0 (including) | 1.2.0 (including) |
Wireshark | Wireshark | 1.2.1 (including) | 1.2.1 (including) |
Wireshark | Wireshark | 1.2.2 (including) | 1.2.2 (including) |
Wireshark | Wireshark | 1.2.3 (including) | 1.2.3 (including) |
Wireshark | Wireshark | 1.2.4 (including) | 1.2.4 (including) |
Wireshark | Wireshark | 1.2.5 (including) | 1.2.5 (including) |
Wireshark | Wireshark | 1.2.6 (including) | 1.2.6 (including) |
Wireshark | Wireshark | 1.2.7 (including) | 1.2.7 (including) |
Wireshark | Wireshark | 1.2.8 (including) | 1.2.8 (including) |
Wireshark | Wireshark | 1.2.9 (including) | 1.2.9 (including) |
Wireshark | Wireshark | 1.2.10 (including) | 1.2.10 (including) |
Wireshark | Wireshark | 1.2.11 (including) | 1.2.11 (including) |
Wireshark | Wireshark | 1.2.12 (including) | 1.2.12 (including) |
Wireshark | Wireshark | 1.2.13 (including) | 1.2.13 (including) |
Wireshark | Wireshark | 1.2.14 (including) | 1.2.14 (including) |
Wireshark | Wireshark | 1.2.15 (including) | 1.2.15 (including) |
Wireshark | Wireshark | 1.4.0 (including) | 1.4.0 (including) |
Wireshark | Wireshark | 1.4.1 (including) | 1.4.1 (including) |
Wireshark | Wireshark | 1.4.2 (including) | 1.4.2 (including) |
Wireshark | Wireshark | 1.4.3 (including) | 1.4.3 (including) |
Wireshark | Wireshark | 1.4.4 (including) | 1.4.4 (including) |
Wireshark | Ubuntu | hardy | * |
Wireshark | Ubuntu | karmic | * |
Wireshark | Ubuntu | lucid | * |
Wireshark | Ubuntu | maverick | * |
Wireshark | Ubuntu | upstream | * |