ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 5230] New: BER stack overflow

Date: Thu, 16 Sep 2010 15:52:19 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5230

           Summary: BER stack overflow
           Product: Wireshark
           Version: 1.4.0
          Platform: Other
        OS/Version: Mac OS X 10.6
            Status: NEW
          Severity: Major
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: gerald@xxxxxxxxxxxxx


Created an attachment (id=5173)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=5173)
Capture file that triggers recursion in dissect_ber_unknown()

Build Information:
Paste the COMPLETE build information from "Help->About Wireshark", "wireshark
-v", or "tshark -v".
--
Wireshark 1.4.0, 1.2.x, and 1.0.x are vulnerable to a stack overflow in the BER
dissector as described at http://seclists.org/bugtraq/2010/Sep/87

This has been fixed in r34111; this bug report exists mainly to get the sample
capture that the NCNIPC sent into the fuzz menagerie.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.