The dissect_ber_constrained_bitstring function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.10.x prior to 1.10.9 does not properly validate padding values, which allows remote malicious users to cause a denial of service (buffer underflow and application crash) via a crafted packet.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
wireshark wireshark 1.10.8 |
||
wireshark wireshark 1.10.6 |
||
wireshark wireshark 1.10.0 |
||
wireshark wireshark 1.10.3 |
||
wireshark wireshark 1.10.2 |
||
wireshark wireshark 1.10.1 |
||
wireshark wireshark 1.10.7 |
||
wireshark wireshark 1.10.4 |
||
wireshark wireshark 1.10.5 |