Stack consumption vulnerability in the dissect_ber_choice function in the BER dissector in Wireshark 1.2.x through 1.2.15 and 1.4.x through 1.4.4 might allow remote attackers to cause a denial of service (infinite loop) via vectors involving self-referential ASN.1 CHOICE values.
2011-03-03T01:00:01.597
2025-04-11T00:51:21.963
Deferred
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | wireshark | wireshark | 1.2.0 | Yes |
Application | wireshark | wireshark | 1.2.1 | Yes |
Application | wireshark | wireshark | 1.2.2 | Yes |
Application | wireshark | wireshark | 1.2.3 | Yes |
Application | wireshark | wireshark | 1.2.4 | Yes |
Application | wireshark | wireshark | 1.2.5 | Yes |
Application | wireshark | wireshark | 1.2.6 | Yes |
Application | wireshark | wireshark | 1.2.7 | Yes |
Application | wireshark | wireshark | 1.2.8 | Yes |
Application | wireshark | wireshark | 1.2.9 | Yes |
Application | wireshark | wireshark | 1.2.10 | Yes |
Application | wireshark | wireshark | 1.2.11 | Yes |
Application | wireshark | wireshark | 1.2.12 | Yes |
Application | wireshark | wireshark | 1.2.13 | Yes |
Application | wireshark | wireshark | 1.2.14 | Yes |
Application | wireshark | wireshark | 1.2.15 | Yes |
Application | wireshark | wireshark | 1.4.0 | Yes |
Application | wireshark | wireshark | 1.4.1 | Yes |
Application | wireshark | wireshark | 1.4.2 | Yes |
Application | wireshark | wireshark | 1.4.3 | Yes |
Application | wireshark | wireshark | 1.4.4 | Yes |