We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Stack consumption vulnerability in the dissect_ber_choice function in the BER dissector in Wireshark 1.2.x through 1.2.15 and 1.4.x through 1.4.4 might allow remote attackers to cause a denial of service (infinite loop) via vectors involving self-referential ASN.1 CHOICE values.
Reserved 2011-03-02 | Published 2011-03-03 | Updated 2024-10-21 | Assigner mitrewww.wireshark.org/docs/relnotes/wireshark-1.2.15.html
www.wireshark.org/docs/relnotes/wireshark-1.4.4.html
bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
www.vupen.com/english/advisories/2011/0622 (ADV-2011-0622)
www.mandriva.com/security/advisories?name=MDVSA-2011:044 (MDVSA-2011:044)
www.securitytracker.com/id?1025148 (1025148)
oval.cisecurity.org/...inition/oval:org.mitre.oval:def:14724 (oval:org.mitre.oval:def:14724)
Support options