Bug 681758 (CVE-2011-1142)

Summary: CVE-2011-1142 Wireshark: Stack consumption vulnerability in BER dissector can cause DoS
Product: [Other] Security Response Reporter: Huzaifa S. Sidhpurwala <huzaifas>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: huzaifas, jrusnack, jsafrane, rvokal
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-07-09 03:20:52 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Huzaifa S. Sidhpurwala 2011-03-03 07:09:03 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2011-1142
the following vulnerability:

Name: CVE-2011-1142
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1142
Assigned: 20110302
Reference: CONFIRM:http://www.wireshark.org/docs/relnotes/wireshark-1.2.15.html
Reference: CONFIRM:http://www.wireshark.org/docs/relnotes/wireshark-1.4.4.html
Reference: CONFIRM:https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516

Stack consumption vulnerability in the dissect_ber_choice function in
the BER dissector in Wireshark 1.2.x through 1.2.15 and 1.4.x through
1.4.4 might allow remote attackers to cause a denial of service
(infinite loop) via vectors involving self-referential ASN.1 CHOICE
values.

Comment 7 Vincent Danen 2015-07-09 03:20:52 UTC
Statement:

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.