https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5230
Summary: BER stack overflow
Product: Wireshark
Version: 1.4.0
Platform: Other
OS/Version: Mac OS X 10.6
Status: NEW
Severity: Major
Priority: Low
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: gerald@xxxxxxxxxxxxx
Created an attachment (id=5173)
--> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=5173)
Capture file that triggers recursion in dissect_ber_unknown()
Build Information:
Paste the COMPLETE build information from "Help->About Wireshark", "wireshark
-v", or "tshark -v".
--
Wireshark 1.4.0, 1.2.x, and 1.0.x are vulnerable to a stack overflow in the BER
dissector as described at http://seclists.org/bugtraq/2010/Sep/87
This has been fixed in r34111; this bug report exists mainly to get the sample
capture that the NCNIPC sent into the fuzz menagerie.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.