It was reported [1] that all of the BER dissectors in Wireshark were vulnerable to a stack overflow, which would cause Wireshark to crash. The upstream bugzilla [2] includes a capture file that triggers the recursion in dissect_ber_unknown() to demonstrate the flaw. This has been corrected upstream [3] and is scheduled to be included in the forthcoming 1.4.1 and 1.2.12 releases. [1] http://archives.neohapsis.com/archives/bugtraq/2010-09/0088.html [2] https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5230 [3] http://anonsvn.wireshark.org/viewvc?view=rev&revision=34111
Wireshark 1.2.12 is now available: http://www.wireshark.org/docs/relnotes/wireshark-1.2.12.html http://www.wireshark.org/security/wnpa-sec-2010-11.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2010:0924 https://rhn.redhat.com/errata/RHSA-2010-0924.html
Statement: The Red Hat Security Response Team has rated this issue as having low security impact, a future update to wireshark in Red Hat Enterprise Linux 4 and 5 may address this flaw. This issue was addressed in Red Hat Enterprise Linux 6 via https://rhn.redhat.com/errata/RHSA-2010-0924.html.
Created wireshark tracking bugs for this issue Affects: fedora-all [bug 676781]
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5 Via RHSA-2011:0370 https://rhn.redhat.com/errata/RHSA-2011-0370.html