First published: Thu Mar 03 2011(Updated: )
Stack consumption vulnerability in the dissect_ber_choice function in the BER dissector in Wireshark 1.2.x through 1.2.15 and 1.4.x through 1.4.4 might allow remote attackers to cause a denial of service (infinite loop) via vectors involving self-referential ASN.1 CHOICE values.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =1.4.2 | |
Wireshark Wireshark | =1.2.7 | |
Wireshark Wireshark | =1.4.0 | |
Wireshark Wireshark | =1.2.11 | |
Wireshark Wireshark | =1.2.10 | |
Wireshark Wireshark | =1.2.6 | |
Wireshark Wireshark | =1.2.8 | |
Wireshark Wireshark | =1.2.0 | |
Wireshark Wireshark | =1.2.15 | |
Wireshark Wireshark | =1.2.14 | |
Wireshark Wireshark | =1.2.3 | |
Wireshark Wireshark | =1.2.12 | |
Wireshark Wireshark | =1.4.4 | |
Wireshark Wireshark | =1.2.13 | |
Wireshark Wireshark | =1.2.5 | |
Wireshark Wireshark | =1.2.1 | |
Wireshark Wireshark | =1.2.4 | |
Wireshark Wireshark | =1.4.3 | |
Wireshark Wireshark | =1.2.9 | |
Wireshark Wireshark | =1.2.2 | |
Wireshark Wireshark | =1.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1142 is classified as a denial of service vulnerability that can lead to application crashes due to stack consumption.
To fix CVE-2011-1142, upgrade to Wireshark version 1.2.16 or later, or 1.4.5 or later to mitigate the vulnerability.
CVE-2011-1142 affects Wireshark versions 1.2.x up to 1.2.15 and 1.4.x up to 1.4.4.
CVE-2011-1142 can be exploited by remote attackers using specially crafted ASN.1 CHOICE values to trigger an infinite loop.
Anyone using the affected versions of Wireshark is potentially vulnerable to attacks exploiting CVE-2011-1142.