Total vulnerabilities in the database
Stack consumption vulnerability in the dissect_ber_choice function in the BER dissector in Wireshark 1.2.x through 1.2.15 and 1.4.x through 1.4.4 might allow remote attackers to cause a denial of service (infinite loop) via vectors involving self-referential ASN.1 CHOICE values.
Software | From | Fixed in |
---|---|---|
wireshark / wireshark | 1.4.2 | 1.4.2.x |
wireshark / wireshark | 1.2.7 | 1.2.7.x |
wireshark / wireshark | 1.4.0 | 1.4.0.x |
wireshark / wireshark | 1.2.11 | 1.2.11.x |
wireshark / wireshark | 1.2.10 | 1.2.10.x |
wireshark / wireshark | 1.2.6 | 1.2.6.x |
wireshark / wireshark | 1.2.8 | 1.2.8.x |
wireshark / wireshark | 1.2.0 | 1.2.0.x |
wireshark / wireshark | 1.2.15 | 1.2.15.x |
wireshark / wireshark | 1.2.14 | 1.2.14.x |
wireshark / wireshark | 1.2.3 | 1.2.3.x |
wireshark / wireshark | 1.2.12 | 1.2.12.x |
wireshark / wireshark | 1.4.4 | 1.4.4.x |
wireshark / wireshark | 1.2.13 | 1.2.13.x |
wireshark / wireshark | 1.2.5 | 1.2.5.x |
wireshark / wireshark | 1.2.1 | 1.2.1.x |
wireshark / wireshark | 1.2.4 | 1.2.4.x |
wireshark / wireshark | 1.4.3 | 1.4.3.x |
wireshark / wireshark | 1.2.9 | 1.2.9.x |
wireshark / wireshark | 1.2.2 | 1.2.2.x |
wireshark / wireshark | 1.4.1 | 1.4.1.x |