{"id":"CVE-2010-3445","details":"Stack consumption vulnerability in the dissect_ber_unknown function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.4.x before 1.4.1 and 1.2.x before 1.2.12 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a long string in an unknown ASN.1/BER encoded packet, as demonstrated using SNMP.","modified":"2026-04-10T03:41:25.541541Z","published":"2010-11-26T19:00:07Z","related":["openSUSE-SU-2024:10199-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/42392"},{"type":"ADVISORY","url":"http://secunia.com/advisories/42411"},{"type":"ADVISORY","url":"http://secunia.com/advisories/42877"},{"type":"ADVISORY","url":"http://secunia.com/advisories/43068"},{"type":"ADVISORY","url":"http://secunia.com/advisories/43759"},{"type":"ADVISORY","url":"http://secunia.com/advisories/43821"},{"type":"ADVISORY","url":"http://www.debian.org/security/2010/dsa-2127"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:200"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2010/3067"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2010/3093"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2011/0076"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2011/0212"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2011/0404"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2011/0626"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2011/0719"},{"type":"ARTICLE","url":"http://blogs.sun.com/security/entry/resource_management_errors_vulnerability_in"},{"type":"EVIDENCE","url":"http://xorl.wordpress.com/2010/10/15/cve-2010-3445-wireshark-asn-1-ber-stack-overflow/"},{"type":"REPORT","url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5230"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-3445"},{"type":"WEB","url":"http://archives.neohapsis.com/archives/bugtraq/2010-09/0088.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055364.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055650.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055664.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"},{"type":"WEB","url":"http://www.kb.cert.org/vuls/id/215900"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2010/10/01/10"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2010/10/12/1"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2010-0924.html"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2011-0370.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/43197"},{"type":"WEB","url":"http://www.wireshark.org/security/wnpa-sec-2010-12.html"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14607"}],"schema_version":"1.7.5"}