5
CVSSv2

CVE-2010-3445

Published: 26/11/2010 Updated: 19/09/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Stack consumption vulnerability in the dissect_ber_unknown function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.4.x prior to 1.4.1 and 1.2.x prior to 1.2.12 allows remote malicious users to cause a denial of service (NULL pointer dereference and crash) via a long string in an unknown ASN.1/BER encoded packet, as demonstrated using SNMP.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark 1.2.5

wireshark wireshark 1.2.3

wireshark wireshark 1.2.11

wireshark wireshark 1.4.0

wireshark wireshark 1.2.7

wireshark wireshark 1.2.6

wireshark wireshark 1.2.9

wireshark wireshark 1.2.10

wireshark wireshark 1.2.8

wireshark wireshark 1.2.1

wireshark wireshark 1.2.2

wireshark wireshark 1.2.4

wireshark wireshark 1.2.0

Vendor Advisories

Debian Bug report logs - #776135 wireshark: Multiple security issues in 1122 and prior versions Package: wireshark; Maintainer for wireshark is Balint Reczey <rbalint@ubuntucom>; Source for wireshark is src:wireshark (PTS, buildd, popcon) Reported by: balint@balintreczeyhu Date: Sat, 24 Jan 2015 10:51:01 UTC Severity: ...
Debian Bug report logs - #780372 CVE-2015-2187 CVE-2015-2188 CVE-2015-2189 CVE-2015-2190 CVE-2015-2191 CVE-2015-2192 Package: wireshark; Maintainer for wireshark is Balint Reczey <rbalint@ubuntucom>; Source for wireshark is src:wireshark (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Th ...
A flaw has been found in wireshark, a network protocol analyzer It was found that the ASN1 BER dissector was susceptible to a stack overflow, causing the application to crash For the stable distribution (lenny), the problem has been fixed in version 102-3+lenny11 For the testing distribution (squeeze) and the unstable distribution (sid), this ...

References

CWE-399http://xorl.wordpress.com/2010/10/15/cve-2010-3445-wireshark-asn-1-ber-stack-overflow/http://www.mandriva.com/security/advisories?name=MDVSA-2010:200http://www.openwall.com/lists/oss-security/2010/10/12/1http://archives.neohapsis.com/archives/bugtraq/2010-09/0088.htmlhttps://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5230http://www.openwall.com/lists/oss-security/2010/10/01/10https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-3445http://www.debian.org/security/2010/dsa-2127http://secunia.com/advisories/42392http://www.wireshark.org/security/wnpa-sec-2010-12.htmlhttp://www.securityfocus.com/bid/43197http://www.redhat.com/support/errata/RHSA-2010-0924.htmlhttp://www.vupen.com/english/advisories/2010/3067http://www.vupen.com/english/advisories/2010/3093http://secunia.com/advisories/42411http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.htmlhttp://www.vupen.com/english/advisories/2011/0076http://secunia.com/advisories/42877http://secunia.com/advisories/43068http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.htmlhttp://www.vupen.com/english/advisories/2011/0212http://www.vupen.com/english/advisories/2011/0404http://blogs.sun.com/security/entry/resource_management_errors_vulnerability_inhttp://www.vupen.com/english/advisories/2011/0719http://www.redhat.com/support/errata/RHSA-2011-0370.htmlhttp://secunia.com/advisories/43821http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055650.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2011-March/055664.htmlhttp://www.kb.cert.org/vuls/id/215900http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055364.htmlhttp://www.vupen.com/english/advisories/2011/0626http://secunia.com/advisories/43759https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14607https://nvd.nist.govhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776135https://www.debian.org/security/./dsa-2127