All the vulnerabilites related to gnu - libtasn1
Vulnerability from fkie_nvd
Published
2012-03-26 19:55
Modified
2024-11-21 01:37
Severity ?
Summary
The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DAE9020-329B-487B-AA25-B17CBEFE07E2", "versionEndIncluding": "3.0.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "4FBB8F2C-498D-4D31-A7D7-9991BABEA7A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "8856E1B1-8007-42E5-82EF-4700D4DEEDDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "A9CF40D3-CE03-4C2A-8EEF-EB5989291806", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC60D4CC-922C-4941-A400-0CBEAC7F31D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "754A0D19-A17A-4007-8355-497D14CFCBF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "8140DBE1-8116-4051-9A57-07535586E0AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "56D2DF7F-DCDD-486D-B906-F9DDE3A1DB70", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "F1CC840D-AD01-4EE2-8652-06742A6286BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "84224A82-6D58-4000-A449-20C1632DAE85", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "A466931C-769A-4A28-B072-10930CE655E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "2FEE50AC-8730-4F04-B57C-6BDF8B957F6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "10F621DC-7967-4D97-A562-02E7033C89C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "776E5481-399F-45BC-AD20-A18508B03916", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "63D7F972-9128-4A4D-8508-B38CE2F155E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C5D56873-E8C5-4E4B-BB85-6DCF6526B453", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "54FE4766-32D0-491E-8C71-5B998C468142", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7F980857-2364-466A-8366-BD017D242222", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "4CDCF1F0-5A78-48FF-B4B0-303AE2420F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "0A2E649D-5C45-4412-927B-E3EDCE07587C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "066175C2-6E96-4BAE-B1A6-B23D25547FAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "869D3010-67AE-44D0-BB8F-D9C410AEA1D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "052B40C1-C29B-4189-9A45-DAE873AB716D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "02F71E61-7455-4E10-B9D8-2B7FDDFB10F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "5E05A9A1-6B7A-43FB-A9B8-41B68CA5FDCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "1FB08FD9-9AB8-4015-A8BE-FD9F7EBAC6DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "B588AAE0-8C3F-47C7-812F-8C97BD8795E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "EBB9154B-4254-4F33-8DB2-5B96E2DA4931", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "64D9C191-6A57-40BB-BDD1-6B1A6BBAB51E", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "A2EA79D1-2EA8-4040-A5B5-C93EE937945A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "61D05BC3-1315-4AC7-884D-41459272C94B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.2.8.1a1:*:*:*:*:*:*:*", "matchCriteriaId": "2901E522-6F54-4FA5-BF22-463A9D6B53D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "738F29DA-9741-4BA5-B370-417443A3AC2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "52173492-1031-4AA4-A600-6210581059D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "BB636C36-2884-4F66-B68A-4494AEAF90C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "777A16E4-A1F5-48DC-9BF0-CD9F0DCF8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "EC4231BD-201D-4B10-9E35-B9EEFC714F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C9200C3-0F46-4238-918B-38D95BF11547", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "024A9511-7CB4-4681-8429-0FE7FC34DF1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "34CEF5ED-87A5-44B2-8A4A-9896957C057B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "1B84A4F5-CED7-4633-913F-BE8235F68616", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "97564ABD-F9CE-4B3C-978A-1622DE3E4924", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "3DB6EC88-DCE0-439B-89CD-18229965849B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "1E2C89DD-CDBD-4772-A031-089F32006D80", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "8C2FD618-91F4-48E7-B945-90CC0A367DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "65DC9555-E76F-4F8D-AE39-5160B34A87FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "8B61D180-9EEA-4258-9A59-7F004F2C83F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "00DE1208-BDDC-405B-A34A-B58D00A279DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B8EF689E-59AA-4619-ADB2-E195CFD4094A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "B62AB660-5DA4-4F13-AF9E-DC53D0A18EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "22314ED6-D0CD-442E-A645-A9CCFE114AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "A9E1C5B2-27BF-4328-9336-98B8828EE4BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "B5C952BF-A135-4B15-8A51-94D66B618469", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "6ADED309-0A25-478D-B542-96217A0DD63E", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC0403DE-76B1-4E24-8014-64F73DCB53DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "69EA91B0-249F-41B2-8AD0-0C2AD29BE3D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "7F714D22-873A-4D64-8151-86BB55EFD084", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4E9181F9-50FF-4995-9554-022CF93376C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "AED0B40F-3413-40D6-B1EF-E6354D2A91F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E99A7D8-2303-4268-8EF8-6F01A042BEDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "86C70F69-FB80-4F32-A798-71A5153E6C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "B2A1E604-500E-4181-BF66-BB69C7C3F425", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "0C8120E3-B60F-44E4-B837-4707A9BAEDBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "84D3F16F-2C23-48E9-9F2D-1F1DF74719E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "F7073EAD-06C9-4309-B479-135021E82B99", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "546C56AC-AFCC-47B7-A5A8-D3E3199BEA41", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "1895868E-E501-42C2-8450-EEED4447BAB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "2ED1FCE0-260B-4FB2-9DBD-F4D0D35639AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "199AA36A-3B23-438C-9109-CC9000372986", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "DD6FFF05-37B2-4D69-86AF-921591382D21", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.13:*:*:*:*:*:*:*", "matchCriteriaId": "82BF8600-4E5D-4FF4-953C-F2DC726CA6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.14:*:*:*:*:*:*:*", "matchCriteriaId": "04C40F0E-B102-4FE8-9E93-0ACFBF35226D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.15:*:*:*:*:*:*:*", "matchCriteriaId": "22802660-D33F-4683-B82F-C94AC6170A73", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.16:*:*:*:*:*:*:*", "matchCriteriaId": "3623E9BE-F513-4301-BF0C-6A7F87E78E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.17:*:*:*:*:*:*:*", "matchCriteriaId": "B5DBAF08-1441-4F14-A740-E90044B77042", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "4CE9BB7E-DDD8-4CBF-AEC2-40D59A560BD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:1.7.19:*:*:*:*:*:*:*", "matchCriteriaId": "5D3B6684-3890-4B60-BE67-D06045A86B3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "81C6C982-21D5-4FE3-A342-FC45BD78D2F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A69E3A01-D8C6-4C36-8C4E-52B96541D5B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9D61596-01EB-4936-923B-63537625F926", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "599EB59C-7717-47A8-84C6-78B6D79AEB02", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4A6CBB77-818D-4DFF-9DD9-07EBF9933B06", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "26E9005E-5034-43F2-B96E-7829E19FE3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FA854EA-29FE-4B91-AEA3-ED649D7FD25A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DC3A5EE-2892-4548-A0CB-D3289CD64D63", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "83F22BF4-A738-438B-8D0B-6993640F0D31", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9D3193B7-8FB9-45E4-BFF6-891A3F14F021", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AF269AE-121B-4982-A765-5C7E806FA9FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1C9F604-7FBE-4759-B039-8F5894574203", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "191821CD-E4CB-4269-B04C-284A9F9783B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "B2A71474-958D-4689-A652-3E2A731F47FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "38169043-17DF-4CF9-963A-8770B8882357", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D7E5D9C-0976-4C9A-9FEB-AB923845BAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C4537676-A72E-4433-B44F-3664EDD6F240", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "D7CCCB66-C7CC-4E5C-8253-C29D57BE9B43", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "8D090B10-68F2-424D-8234-2A280AA96B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "23168B77-645D-4A2A-A6E3-7001104064A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D085B16-3116-423F-BDE0-2D93E12650A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C59247E9-CDAE-4269-A8E4-F49F617CDD23", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6019C0C-E9DD-4831-8E6A-785AE1A930FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "16F9CF15-8789-49B6-BB6D-B784C8FF20ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "A6DAE798-14C9-4CB6-A39F-69CDF9D8FBB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "C51E0C88-B19C-408D-AC17-10CE7462D48A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "7A7FBFAA-263C-4B7B-A135-9824DFD8CCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "2AC41482-B3BC-4C93-A850-73A179BAB763", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "ADC80BE1-28A6-4348-A061-8FD9C805E945", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "9D8EF703-AE06-4DD7-9235-2D8CCDB24F96", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "9A8AC314-065B-4BC3-A5EE-CA6D3006F9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "D8201FF6-53A8-4850-A2B2-47AA65B2CB75", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "AFB33002-E5C6-4573-BC94-647DDE4E6F89", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "8D7D245A-D983-40AD-89A7-0EA00D38D570", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "A7223691-225D-4649-B410-F41D2C489BA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F786B6F2-77FC-4DFE-A574-2C00EDC08CE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA9E7F22-5BC4-4AD5-A630-25947CC1E5B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6B3DBF9-52EB-4741-85E4-E68645BD81E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "350A6845-77D6-4D63-A13C-5DAB55F98727", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "8A456D12-C43A-47B0-AC0D-BF02AEBA0828", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4D457688-987A-4059-AA58-D9BF19ABC48B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "AA20043D-EC85-4003-9E7B-27AB50F4E133", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "18A2C47E-510D-4537-8F51-3763A73E8E52", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "4704D411-7B24-4B1F-9D40-A39A178FF873", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "2B5E7C27-A5D9-4ABD-AFC5-5367083F387F", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3091701-9B7C-4494-A82E-6E6F64656D85", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "541BCA04-0500-4388-9140-55C17E17EB15", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "E11431F6-8C9D-40E1-84F6-CD25147DB15E", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "0DC3D824-585E-49F1-9E44-902F5C7D57D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "2097221B-46C2-480C-8D79-54080186BB58", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "D5CEC430-8CFF-4DC5-9B2B-338C401B1984", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "F2DAA60D-F9B4-4045-81C2-29AD913E7BF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "547CC163-57F9-4418-BFB1-0E688DEEE0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A274912-B16F-4B91-8CC0-E5CEED04B678", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA84D0DE-B63F-41E4-AB04-70D2F5134D46", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "5552C7B3-5D56-4858-B138-F49CD1F90513", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "9F7E11DD-6AFC-4271-92D5-FB41CA6E1B52", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "BA23D0EC-6014-4303-962A-1936EFCE3D16", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "D0E6021A-40FC-457A-8AAA-0F7E7F9E6752", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "62E5D41F-1837-42C3-B99C-5A0A36013AC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "8BA54B99-2FF1-432F-9587-8F384323CADE", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "39F59B50-BC97-43B3-BC15-C767F420291E", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.12.4:*:*:*:*:*:*:*", "matchCriteriaId": "37B25626-7C72-4BAE-85FF-415A5F376A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "31E092EF-D7F6-4160-B928-3C3EA1198B33", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.12.6:*:*:*:*:*:*:*", "matchCriteriaId": "52C9B2C9-60F6-4BA0-B1F6-5C697065D098", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.12.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "2F80978A-AAE2-4B69-B54E-C30B9D96C034", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.12.7:*:*:*:*:*:*:*", "matchCriteriaId": "8392ACC4-0325-464D-A39A-E9CDC5AADF1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.12.8:*:*:*:*:*:*:*", "matchCriteriaId": "185A2FAD-5541-4439-924B-406BD33E6FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.12.9:*:*:*:*:*:*:*", "matchCriteriaId": "854F260C-4C7D-4855-8644-4B6DC7CD5657", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.12.10:*:*:*:*:*:*:*", "matchCriteriaId": "9943C65B-B896-4F7B-BE86-D6D13CF5C6E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.12.11:*:*:*:*:*:*:*", "matchCriteriaId": "07E877F8-3623-4295-816F-7EE4FFDE1599", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.12.12:*:*:*:*:*:*:*", "matchCriteriaId": "EEBBF961-3DB5-4DBC-AB6F-D3180EA79E6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.12.13:*:*:*:*:*:*:*", "matchCriteriaId": "86E711C7-37EE-4957-BD49-FA08103357BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:2.12.14:*:*:*:*:*:*:*", "matchCriteriaId": "A964A74F-CC0E-4E2E-8DBB-858A66EA2566", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC43DD1B-D8F0-4CC6-A5A9-C0DCEB1A7131", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8150D656-9B13-49D0-9960-4C78E057AB26", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9C048B6A-5AB2-4363-8FE1-88D3F627E1BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "ABA62CAC-C88C-44E5-A611-366F9AD5FB11", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B53405BD-AC8E-4106-9D21-BCD5815E7ECA", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0161F845-C5F4-4318-949A-499A4062FB78", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "DBCACBF9-CE33-4F10-8CFC-84F24CC33476", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "C42F577F-264C-4F8F-955A-67743965AB8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9000897D-502D-46E3-95A0-FBCEBB0ED5C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E53BBB9E-3A38-478E-BE88-E5C83E0C9ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "C1B8EDFF-5683-4171-BA76-9B26CAE19FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "022F28CD-4D6B-48AB-8E39-244E19D34F67", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "16B5986E-1029-4D40-8012-1FF1615C929A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "45439989-0D3B-4DCE-AB35-B63B1543CD59", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BBCD4F3C-8BD4-4367-B00C-A1379C158625", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "12F2CFB7-5ACF-4328-B0F8-C3A981CAA368", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF062C51-CADD-46B1-A121-32CB6A18F2FC", "versionEndIncluding": "2.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7031435B-D0CA-488B-86D2-DB7E031CC4DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "09F703B5-5548-4B21-97C4-EEB5A79BFDA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "7DDC2A2A-80A8-4F0B-9050-88E68C614605", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "85655541-7911-4F23-967B-A8EE8F77CB27", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B9548F8E-9558-48E7-B7AA-52536C16D39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8DE5A7AC-2608-41AB-B319-7FE54EE638DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "715A4581-1FA7-4BBD-9CBD-0EEEDF6EB85A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EB27F841-7ECF-46A8-A353-572D57CFA8DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "43639215-5F31-4168-B40B-BC23DFC6F449", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "6895DBDF-02F3-4ABE-94C9-2B389B1633A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "AF8BEFC7-B81E-4872-AA0F-3382C4340E2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "467A9372-936A-43B6-AA6E-4B110460E53B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "DCB8982C-9131-4A65-AD52-BCC50E204BFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "8C4F854E-8C99-4BB0-8146-0F95C25385F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "370BA774-EBA1-454C-82B7-6ACE43744B72", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "5A004586-34BE-42A7-9DD2-8991AC651407", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "9B6324E8-2B22-4567-B5B6-A6CC5CA12DBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "8BED632B-43B5-4AC2-8DC8-55A2032CDA58", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "87C997F9-9480-4980-9FA2-045248EE0DDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "FE11CD41-CBEE-413B-BD6C-FECEA6778CEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "1C4D083C-0D60-476C-9A9B-62E38CE709A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "36F87440-811B-4AD7-8B62-5B8E88D7F3C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "C56DB483-22C8-483D-B11B-DFAABF7223BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D51918C9-18B0-434C-B097-FBC78BE7307F", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "0F9C52B5-4CA8-4777-B6EE-62F924B47B0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "29E05ABB-DE4D-411D-A1B7-E4194825F75D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "75F77DCC-6C4C-4CFB-BFAF-1BD8EF1D606D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "F7DCAF92-7732-477D-8E4F-D3FA3F9B5C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "9A6328C0-1A21-4935-9E71-C3C38BD118B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "9E623FF7-EE83-42B3-B4F3-F521820B417C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "75BA158E-BD3A-4F97-A142-F3426AAD4170", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "C5D2DF6E-FDD2-4C3C-9EA5-A509BF946539", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:0.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "8352B632-E674-453A-BE64-81960D2382D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C3531C0-E08D-4BFF-8335-3F653A77B3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "355D4841-1447-41EF-9B85-C5E2B7C0A5DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC4C3B81-8AF3-40EF-8997-221600B1B2FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "DC8EE05F-000A-46ED-A819-A7253D299260", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33060E8C-EA63-4599-8765-B72F7809C914", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "33B23D8C-269A-4E37-BEFD-262424EDEAD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "120B5DD9-C74D-44C0-AF40-D71E6F3107BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "2023D887-50B5-485B-BECF-E4C9107E46BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:1.8:*:*:*:*:*:*:*", "matchCriteriaId": "0F875C0B-4AE3-4B71-ABEE-703477919747", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4356476-E1C4-4C72-9AE8-DA1AE541A654", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "638381FC-4AFF-47BF-B280-8C6A77FC6966", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B5DB9D74-F831-4A2A-8B7A-692DDC21D627", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "40DDDE9D-8F3F-494D-8FD6-205CBFC5F8B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "767DF7D3-534F-4F18-8B59-4F1C9A7EA404", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "6DDA21F2-B48C-41DB-958E-0DC3DA3C3B88", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "BD2BD591-165A-4DF6-88CD-E1D6A7B67505", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8CCB275D-8510-464B-BEC3-51A3D1A402C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "05D976E9-191B-4150-9339-56DB7E137641", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "BD197F74-96EC-4CBD-B21E-F703799A0B51", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:2.10:*:*:*:*:*:*:*", "matchCriteriaId": "1A063194-9A64-4FA3-AF00-856825028855", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure." }, { "lang": "es", "value": "La funci\u00f3n asn1_get_length_der en decoding.c en GNU libtasn1 antes de v2.12, tal y como se usa en GnuTLS antes del v3.0.16 y otros productos, no maneja adecuadamente ciertos valores de longitud demasiado grandes, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de la pila de memoria y ca\u00edda de la aplicaci\u00f3n) o posiblemente tener un impacto no especificado a trav\u00e9s de una estructura ASN.1 especificamente elaborada para este fin." } ], "id": "CVE-2012-1569", "lastModified": "2024-11-21T01:37:13.643", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-03-26T19:55:01.110", "references": [ { "source": "secalert@redhat.com", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0099.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5932" }, { "source": "secalert@redhat.com", "url": "http://article.gmane.org/gmane.comp.gnu.libtasn1.general/53" }, { "source": "secalert@redhat.com", "url": "http://article.gmane.org/gmane.comp.gnu.libtasn1.general/54" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://blog.mudynamics.com/2012/03/20/gnutls-and-libtasn1-vulns/" }, { "source": "secalert@redhat.com", "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/076856.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/076865.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077284.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077339.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078207.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076699.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2012-0427.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2012-0488.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/48397" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/48488" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/48505" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/48578" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/48596" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/49002" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/50739" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/57260" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2012/dsa-2440" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.gnu.org/software/gnutls/security.html" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:039" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/03/20/3" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/03/20/8" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/03/21/5" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1026829" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1436-1" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804920" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0099.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://article.gmane.org/gmane.comp.gnu.libtasn1.general/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://article.gmane.org/gmane.comp.gnu.libtasn1.general/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://blog.mudynamics.com/2012/03/20/gnutls-and-libtasn1-vulns/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/076856.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/076865.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077284.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077339.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078207.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076699.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2012-0427.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2012-0488.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48397" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48488" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48505" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48578" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48596" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/50739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/57260" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2440" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.gnu.org/software/gnutls/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:039" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/03/20/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/03/20/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/03/21/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026829" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1436-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804920" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-07-02 03:29
Modified
2024-11-21 03:06
Severity ?
Summary
The _asn1_check_identifier function in GNU Libtasn1 through 4.12 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure. It may lead to a remote denial of service attack.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*", "matchCriteriaId": "536BB341-F6FC-4417-AC6F-136EC90AADD0", "versionEndIncluding": "4.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The _asn1_check_identifier function in GNU Libtasn1 through 4.12 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure. It may lead to a remote denial of service attack." }, { "lang": "es", "value": "La funci\u00f3n _asn1_check_identifier en GNU Libtasn1 hasta la versi\u00f3n 4.12 provoca una desreferencia de puntero NULL y un cierre inesperado cuando se leen entradas manipuladas que desencadenan la asignaci\u00f3n de un valor NULL en una estructura asn1_node. Esto puede dar lugar a un ataque remoto de denegaci\u00f3n de servicio (DoS)." } ], "id": "CVE-2017-10790", "lastModified": "2024-11-21T03:06:30.177", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-07-02T03:29:00.183", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1464141" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00026.html" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201710-11" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/3547-1/" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2018/dsa-4106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1464141" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201710-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3547-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4106" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-05-05 18:59
Modified
2024-11-21 02:51
Severity ?
Summary
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 15.10 | |
canonical | ubuntu_linux | 16.04 | |
opensuse | opensuse | 13.2 | |
gnu | libtasn1 | * | |
fedoraproject | fedora | 22 | |
fedoraproject | fedora | 23 | |
fedoraproject | fedora | 24 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*", "matchCriteriaId": "7838BCC2-1E49-4595-B3FE-17A4EFF4A1CD", "versionEndIncluding": "4.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "matchCriteriaId": "E79AB8DD-C907-4038-A931-1A5A4CFB6A5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "matchCriteriaId": "C729D5D1-ED95-443A-9F53-5D7C2FD9B80C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate." }, { "lang": "es", "value": "La funci\u00f3n _asn1_extract_der_octet en lib/decoding.c en GNU Libtasn1 en versiones anteriores a 4.8, cuando se utiliza sin el indicador ASN1_DECODE_FLAG_STRICT_DER, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recursi\u00f3n infinita) a trav\u00e9s de un certificado manipulado." } ], "id": "CVE-2016-4008", "lastModified": "2024-11-21T02:51:09.420", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-05-05T18:59:10.380", "references": [ { "source": "cve@mitre.org", "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625" }, { "source": "cve@mitre.org", "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=f435825c0f527a8e52e6ffbc3ad0bc60531d537e" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2016/dsa-3568" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2016/04/11/3" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2957-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2957-2" }, { "source": "cve@mitre.org", "url": "https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201703-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=f435825c0f527a8e52e6ffbc3ad0bc60531d537e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2016/04/11/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2957-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2957-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201703-05" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-06-05 20:55
Modified
2024-11-21 02:08
Severity ?
Summary
The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*", "matchCriteriaId": "77216B5D-E820-4137-B00F-0B66CD08EEE1", "versionEndExcluding": "3.5.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*", "matchCriteriaId": "2350B15F-7A7A-4BCD-852D-F9999C61DEDF", "versionEndExcluding": "3.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "37BA55FC-D350-4DEB-9802-40AF59C99E79", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "569964DA-31BE-4520-A66D-C3B09D557AB8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "807C024A-F8E8-4B48-A349-4C68CD252CA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "83737173-E12E-4641-BC49-0BD84A6B29D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "835AE071-CEAE-49E5-8F0C-E5F50FB85EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "A3A907A3-2A3A-46D4-8D75-914649877B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*", "matchCriteriaId": "67960FB9-13D1-4DEE-8158-31BF31BCBE6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "matchCriteriaId": "CB6476C7-03F2-4939-AB85-69AA524516D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*", "matchCriteriaId": "E534C201-BCC5-473C-AAA7-AAB97CEB5437", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "matchCriteriaId": "2470C6E8-2024-4CF5-9982-CFF50E88EAE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "2F7F8866-DEAD-44D1-AB10-21EE611AA026", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument." }, { "lang": "es", "value": "Las funciones (1) asn1_read_value_type y (2) asn1_read_value en GNU Libtasn1 anterior a 3.6 permite a atacantes dependientes de contexto causar una denegaci\u00f3n de servicio (referencia de puntero nulo y ca\u00edda) a trav\u00e9s de un valor nulo en un argumento ivalue." } ], "id": "CVE-2014-3469", "lastModified": "2024-11-21T02:08:10.027", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-06-05T20:55:06.347", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://advisories.mageia.org/MGASA-2014-0247.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0596.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0687.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58591" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58614" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59021" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59057" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59408" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60320" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60415" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/61888" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3056" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:116" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://advisories.mageia.org/MGASA-2014-0247.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0596.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0687.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58591" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59057" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59408" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/61888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102329" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-05-12 19:59
Modified
2024-11-21 02:29
Severity ?
Summary
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*", "matchCriteriaId": "56BDB5A0-0839-4A20-A003-B8CD56F48171", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C544A56-1034-42CC-B8B6-33F549C9CCB8", "versionEndIncluding": "4.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate." }, { "lang": "es", "value": "La funci\u00f3n _asn1_extract_der_octet en lib/decoding.c en GNU Libtasn1 anterior a 4.5 permite a atacantes remotos causar una denegaci\u00f3n de servicio (lectura de memoria din\u00e1mica fuera de rango) a trav\u00e9s de un certificado manipulado." } ], "id": "CVE-2015-3622", "lastModified": "2024-11-21T02:29:30.140", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-05-12T19:59:24.043", "references": [ { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158225.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00014.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/131711/libtasn1-Heap-Overflow.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Apr/109" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3256" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:232" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/74419" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032246" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2604-1" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2017:1860" }, { "source": "cve@mitre.org", "url": "https://lists.gnu.org/archive/html/help-libtasn1/2015-04/msg00000.html" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201509-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158225.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/131711/libtasn1-Heap-Overflow.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Apr/109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/74419" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032246" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2604-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:1860" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.gnu.org/archive/html/help-libtasn1/2015-04/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201509-04" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-22 20:29
Modified
2024-11-21 04:09
Severity ?
Summary
An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnu | libtasn1 | * | |
debian | debian_linux | 9.0 | |
fedoraproject | fedora | 26 | |
fedoraproject | fedora | 27 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*", "matchCriteriaId": "536BB341-F6FC-4417-AC6F-136EC90AADD0", "versionEndIncluding": "4.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*", "matchCriteriaId": "6E4D8269-B407-4C24-AAB0-02F885C7D752", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*", "matchCriteriaId": "DBEACBFF-6D05-4B69-BF7A-F7E539D9BF6E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS." }, { "lang": "es", "value": "Se ha descubierto un problema en la funci\u00f3n _asn1_decode_simple_ber en decoding.c en GNU Libtasn1, en versiones anteriores a la 4.13. La recursi\u00f3n no limitada en el descodificador BER conduce al agotamiento de la pila y a DoS." } ], "id": "CVE-2018-6003", "lastModified": "2024-11-21T04:09:51.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-22T20:29:00.493", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://git.savannah.nongnu.org/cgit/libtasn1.git/commit/?id=c593ae84cfcde8fea45787e53950e0ac71e9ca97" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535926" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1076832" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gitlab.com/gnutls/libtasn1/commit/946565d8eb05fbf7970ea366e817581bb5a90910" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://git.savannah.nongnu.org/cgit/libtasn1.git/commit/?id=c593ae84cfcde8fea45787e53950e0ac71e9ca97" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535926" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1076832" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitlab.com/gnutls/libtasn1/commit/946565d8eb05fbf7970ea366e817581bb5a90910" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4106" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-674" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-24 14:15
Modified
2024-11-21 06:34
Severity ?
Summary
GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnu | libtasn1 | * | |
fedoraproject | fedora | 35 | |
fedoraproject | fedora | 36 | |
fedoraproject | fedora | 37 | |
debian | debian_linux | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4C88A34-A1CD-4DE5-84A3-90C4A3D8B8C0", "versionEndExcluding": "4.19.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der." }, { "lang": "es", "value": "GNU Libtasn1 versiones anteriores a 4.19.0, presenta una comprobaci\u00f3n de tama\u00f1o de matriz ETYPE_OK fuera de lugar que afecta a la funci\u00f3n asn1_encode_simple_der" } ], "id": "CVE-2021-46848", "lastModified": "2024-11-21T06:34:48.140", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-24T14:15:49.973", "references": [ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/866237" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gitlab.com/gnutls/libtasn1/-/commit/44a700d2051a666235748970c2df047ff207aeb5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gitlab.com/gnutls/libtasn1/-/issues/32" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00003.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AV4SHDJF2XLB4CUPTBPQQ6CLGZ5LKXPZ/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECM2ELTVRYV4BZ5L5GMIRQE27RFHPAQ6/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGO7XST4EIJGX4B2ITZCYSWM24534BSU/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V5LWOGF7QRMNFRUCZY6TDYQJVFI6MOQ2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221118-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/866237" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gitlab.com/gnutls/libtasn1/-/commit/44a700d2051a666235748970c2df047ff207aeb5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gitlab.com/gnutls/libtasn1/-/issues/32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AV4SHDJF2XLB4CUPTBPQQ6CLGZ5LKXPZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECM2ELTVRYV4BZ5L5GMIRQE27RFHPAQ6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGO7XST4EIJGX4B2ITZCYSWM24534BSU/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V5LWOGF7QRMNFRUCZY6TDYQJVFI6MOQ2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221118-0006/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-193" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-06-05 20:55
Modified
2024-11-21 02:08
Severity ?
Summary
The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*", "matchCriteriaId": "77216B5D-E820-4137-B00F-0B66CD08EEE1", "versionEndExcluding": "3.5.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*", "matchCriteriaId": "2350B15F-7A7A-4BCD-852D-F9999C61DEDF", "versionEndExcluding": "3.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "37BA55FC-D350-4DEB-9802-40AF59C99E79", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "569964DA-31BE-4520-A66D-C3B09D557AB8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "807C024A-F8E8-4B48-A349-4C68CD252CA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "83737173-E12E-4641-BC49-0BD84A6B29D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "835AE071-CEAE-49E5-8F0C-E5F50FB85EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "A3A907A3-2A3A-46D4-8D75-914649877B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*", "matchCriteriaId": "67960FB9-13D1-4DEE-8158-31BF31BCBE6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "matchCriteriaId": "CB6476C7-03F2-4939-AB85-69AA524516D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*", "matchCriteriaId": "E534C201-BCC5-473C-AAA7-AAB97CEB5437", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "matchCriteriaId": "2470C6E8-2024-4CF5-9982-CFF50E88EAE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "2F7F8866-DEAD-44D1-AB10-21EE611AA026", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:arx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48A2FBA9-207F-4F16-932D-BF0BA3440503", "versionEndIncluding": "6.4.0", "versionStartIncluding": "6.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:arx:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6AC80F-9D91-468D-BEE3-6A0759723673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data." }, { "lang": "es", "value": "La funci\u00f3n asn1_get_bit_der en GNU Libtasn1 anterior a 3.6 no informa debidamente de un error cuando una longitud de bit negativa est\u00e1 identificada, lo que permite a atacantes dependientes de contexto causar acceso fuera de rango a trav\u00e9s de datos ASN.1 manipulados." } ], "id": "CVE-2014-3468", "lastModified": "2024-11-21T02:08:09.843", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-06-05T20:55:06.283", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://advisories.mageia.org/MGASA-2014-0247.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=1c3ccb3e040bf13e342ee60bc23b21b97b11923f" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0596.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0687.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58591" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58614" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59021" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59057" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59408" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60320" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60415" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/61888" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15423.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3056" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:116" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://advisories.mageia.org/MGASA-2014-0247.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=1c3ccb3e040bf13e342ee60bc23b21b97b11923f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0596.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0687.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58591" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59057" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59408" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/61888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15423.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102323" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-131" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-04-10 15:00
Modified
2024-11-21 02:28
Severity ?
Summary
Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 | |
debian | debian_linux | 7.0 | |
fedoraproject | fedora | 20 | |
fedoraproject | fedora | 21 | |
fedoraproject | fedora | 22 | |
gnu | libtasn1 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "matchCriteriaId": "5D37DF0F-F863-45AC-853A-3E04F9FEC7CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*", "matchCriteriaId": "56BDB5A0-0839-4A20-A003-B8CD56F48171", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0B398E2-A069-4A84-A6AA-CB7F6FB9EF7A", "versionEndIncluding": "4.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors." }, { "lang": "es", "value": "Desbordamiento de buffer basado en pila en asn1_der_decoding en libtasn1 anterior a 4.4 permite a atacantes remotos tener un impacto no especificado a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2015-2806", "lastModified": "2024-11-21T02:28:06.847", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-04-10T15:00:05.960", "references": [ { "source": "cve@mitre.org", "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=4d4f992826a4962790ecd0cce6fbba4a415ce149" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154741.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154805.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155117.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155270.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155435.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155483.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3220" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:193" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/03/29/4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/03/31/2" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/73436" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032080" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2559-1" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2017:1860" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201509-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=4d4f992826a4962790ecd0cce6fbba4a415ce149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154741.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154805.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155117.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155270.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155435.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155483.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3220" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:193" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/03/29/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/03/31/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/73436" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2559-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:1860" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201509-04" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-05-22 19:29
Modified
2024-11-21 03:30
Severity ?
Summary
Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnu | libtasn1 | 4.10 | |
debian | debian_linux | 8.0 | |
apache | bookkeeper | 4.12.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libtasn1:4.10:*:*:*:*:*:*:*", "matchCriteriaId": "17277D17-DF6A-4594-B9FA-8D91EFF3ADBC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:bookkeeper:4.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB293558-0DB0-4EEB-A91C-7B00A9FA634E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Two errors in the \"asn1_find_node()\" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility." }, { "lang": "es", "value": "Se pueden explotar dos errores en la funci\u00f3n \\\"asn1_find_node()\\\" (lib/parser_aux.c) en GnuTLS libtasn1 versi\u00f3n 4.10 para provocar un desbordamiento de b\u00fafer basado en pila enga\u00f1ando a un usuario para que procese un archivo de asignaciones especialmente manipulado mediante la utilidad de ejemplo asn1Coding." } ], "id": "CVE-2017-6891", "lastModified": "2024-11-21T03:30:44.277", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-22T19:29:00.250", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=5520704d075802df25ce4ffccc010ba1641bd484" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3861" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98641" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038619" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Permissions Required" ], "url": "https://secuniaresearch.flexerasoftware.com/advisories/76125/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-11/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201710-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=5520704d075802df25ce4ffccc010ba1641bd484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98641" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038619" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://secuniaresearch.flexerasoftware.com/advisories/76125/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-11/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201710-11" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-06-05 20:55
Modified
2024-11-21 02:08
Severity ?
Summary
Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*", "matchCriteriaId": "77216B5D-E820-4137-B00F-0B66CD08EEE1", "versionEndExcluding": "3.5.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*", "matchCriteriaId": "2350B15F-7A7A-4BCD-852D-F9999C61DEDF", "versionEndExcluding": "3.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "37BA55FC-D350-4DEB-9802-40AF59C99E79", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "569964DA-31BE-4520-A66D-C3B09D557AB8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "807C024A-F8E8-4B48-A349-4C68CD252CA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "83737173-E12E-4641-BC49-0BD84A6B29D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "835AE071-CEAE-49E5-8F0C-E5F50FB85EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "A3A907A3-2A3A-46D4-8D75-914649877B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*", "matchCriteriaId": "67960FB9-13D1-4DEE-8158-31BF31BCBE6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "matchCriteriaId": "CB6476C7-03F2-4939-AB85-69AA524516D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*", "matchCriteriaId": "E534C201-BCC5-473C-AAA7-AAB97CEB5437", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "matchCriteriaId": "2470C6E8-2024-4CF5-9982-CFF50E88EAE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "2F7F8866-DEAD-44D1-AB10-21EE611AA026", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:arx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48A2FBA9-207F-4F16-932D-BF0BA3440503", "versionEndIncluding": "6.4.0", "versionStartIncluding": "6.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:arx:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6AC80F-9D91-468D-BEE3-6A0759723673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en el decodificador DER en GNU Libtasn1 en versiones anteriores a 3.6, como se utiliza en GnuTLS, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (lectura fuera de l\u00edmites) a trav\u00e9s de un archivo ASN.1 manipulado." } ], "id": "CVE-2014-3467", "lastModified": "2024-11-21T02:08:09.663", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-06-05T20:55:06.033", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://advisories.mageia.org/MGASA-2014-0247.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0596.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0687.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58591" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58614" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59021" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59057" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59408" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60320" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60415" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/61888" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15423.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3056" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:116" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102022" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://advisories.mageia.org/MGASA-2014-0247.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0596.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0687.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58591" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59057" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59408" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/61888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15423.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102022" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-08-20 19:31
Modified
2024-11-21 03:40
Severity ?
Summary
GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libtasn1:4.12:*:*:*:*:*:*:*", "matchCriteriaId": "B0DFAFB0-18FA-48C9-A7D0-8AE3DC3B3F65", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:libtasn1:4.13:*:*:*:*:*:*:*", "matchCriteriaId": "E261FB67-8C77-4789-B340-C1DF940ADDAD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file." }, { "lang": "es", "value": "GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contiene una denegaci\u00f3n de servicio (DoS). De manera espec\u00edfica, el uso de recursos de CPU llega al 100% cuando se ejecuta asn1Paser contra el POC debido a que existe un problema en _asn1_expand_object_id(p_tree) en el que, despu\u00e9s de un per\u00edodo largo de tiempo, el programa se bloquea y se cierra. Este ataque parece ser explotable mediante el an\u00e1lisis sint\u00e1ctico de un archivo manipulado." } ], "id": "CVE-2018-1000654", "lastModified": "2024-11-21T03:40:20.150", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-08-20T19:31:44.870", "references": [ { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105151" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gitlab.com/gnutls/libtasn1/issues/4" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gitlab.com/gnutls/libtasn1/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2015-2806
Vulnerability from cvelistv5
Published
2015-04-10 14:00
Modified
2024-08-06 05:24
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:24:39.011Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDVSA-2015:193", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:193" }, { "name": "GLSA-201509-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201509-04" }, { "name": "FEDORA-2015-5199", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155270.html" }, { "name": "USN-2559-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2559-1" }, { "name": "FEDORA-2015-5308", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155117.html" }, { "name": "FEDORA-2015-5390", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155435.html" }, { "name": "FEDORA-2015-5245", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155483.html" }, { "name": "[oss-security] 20150330 Re: Fw: GNU Libtasn1 4.4 released ( fixes stack overflow in asn1_der_decoding)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/03/31/2" }, { "name": "1032080", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032080" }, { "name": "73436", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/73436" }, { "name": "RHSA-2017:1860", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1860" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "FEDORA-2015-5114", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154805.html" }, { "name": "DSA-3220", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3220" }, { "name": "FEDORA-2015-5182", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154741.html" }, { "name": "[oss-security] 20150329 Fw: GNU Libtasn1 4.4 released ( fixes stack overflow in asn1_der_decoding)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/03/29/4" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=4d4f992826a4962790ecd0cce6fbba4a415ce149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "MDVSA-2015:193", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:193" }, { "name": "GLSA-201509-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201509-04" }, { "name": "FEDORA-2015-5199", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155270.html" }, { "name": "USN-2559-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2559-1" }, { "name": "FEDORA-2015-5308", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155117.html" }, { "name": "FEDORA-2015-5390", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155435.html" }, { "name": "FEDORA-2015-5245", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155483.html" }, { "name": "[oss-security] 20150330 Re: Fw: GNU Libtasn1 4.4 released ( fixes stack overflow in asn1_der_decoding)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/03/31/2" }, { "name": "1032080", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032080" }, { "name": "73436", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/73436" }, { "name": "RHSA-2017:1860", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1860" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "FEDORA-2015-5114", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154805.html" }, { "name": "DSA-3220", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3220" }, { "name": "FEDORA-2015-5182", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154741.html" }, { "name": "[oss-security] 20150329 Fw: GNU Libtasn1 4.4 released ( fixes stack overflow in asn1_der_decoding)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/03/29/4" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=4d4f992826a4962790ecd0cce6fbba4a415ce149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2806", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDVSA-2015:193", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:193" }, { "name": "GLSA-201509-04", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201509-04" }, { "name": "FEDORA-2015-5199", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155270.html" }, { "name": "USN-2559-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2559-1" }, { "name": "FEDORA-2015-5308", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155117.html" }, { "name": "FEDORA-2015-5390", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155435.html" }, { "name": "FEDORA-2015-5245", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155483.html" }, { "name": "[oss-security] 20150330 Re: Fw: GNU Libtasn1 4.4 released ( fixes stack overflow in asn1_der_decoding)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/03/31/2" }, { "name": "1032080", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032080" }, { "name": "73436", "refsource": "BID", "url": "http://www.securityfocus.com/bid/73436" }, { "name": "RHSA-2017:1860", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1860" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "FEDORA-2015-5114", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154805.html" }, { "name": "DSA-3220", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3220" }, { "name": "FEDORA-2015-5182", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154741.html" }, { "name": "[oss-security] 20150329 Fw: GNU Libtasn1 4.4 released ( fixes stack overflow in asn1_der_decoding)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/03/29/4" }, { "name": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=4d4f992826a4962790ecd0cce6fbba4a415ce149", "refsource": "CONFIRM", "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=4d4f992826a4962790ecd0cce6fbba4a415ce149" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2806", "datePublished": "2015-04-10T14:00:00", "dateReserved": "2015-03-30T00:00:00", "dateUpdated": "2024-08-06T05:24:39.011Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-3469
Vulnerability from cvelistv5
Published
2014-06-05 20:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:43:06.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "60320", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60320" }, { "name": "DSA-3056", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3056" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "name": "59057", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59057" }, { "name": "SUSE-SU-2014:0758", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "name": "MDVSA-2015:116", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:116" }, { "name": "59021", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59021" }, { "name": "61888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61888" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0247.html" }, { "name": "RHSA-2014:0815", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102329" }, { "name": "RHSA-2014:0596", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0596.html" }, { "name": "[help-libtasn1] 20140525 GNU Libtasn1 3.6 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "name": "58591", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58591" }, { "name": "RHSA-2014:0687", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0687.html" }, { "name": "58614", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58614" }, { "name": "SUSE-SU-2014:0788", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "name": "RHSA-2014:0594", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "name": "60415", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60415" }, { "name": "59408", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59408" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-28T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "60320", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60320" }, { "name": "DSA-3056", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3056" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "name": "59057", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59057" }, { "name": "SUSE-SU-2014:0758", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "name": "MDVSA-2015:116", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:116" }, { "name": "59021", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59021" }, { "name": "61888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61888" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0247.html" }, { "name": "RHSA-2014:0815", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102329" }, { "name": "RHSA-2014:0596", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0596.html" }, { "name": "[help-libtasn1] 20140525 GNU Libtasn1 3.6 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "name": "58591", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58591" }, { "name": "RHSA-2014:0687", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0687.html" }, { "name": "58614", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58614" }, { "name": "SUSE-SU-2014:0788", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "name": "RHSA-2014:0594", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "name": "60415", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60415" }, { "name": "59408", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59408" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3469", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "60320", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60320" }, { "name": "DSA-3056", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3056" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015302", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "name": "59057", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59057" }, { "name": "SUSE-SU-2014:0758", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-0596.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "name": "MDVSA-2015:116", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:116" }, { "name": "59021", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59021" }, { "name": "61888", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61888" }, { "name": "http://advisories.mageia.org/MGASA-2014-0247.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0247.html" }, { "name": "RHSA-2014:0815", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1102329", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102329" }, { "name": "RHSA-2014:0596", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0596.html" }, { "name": "[help-libtasn1] 20140525 GNU Libtasn1 3.6 released", "refsource": "MLIST", "url": "http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015303", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-0594.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "name": "58591", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58591" }, { "name": "RHSA-2014:0687", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0687.html" }, { "name": "58614", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58614" }, { "name": "SUSE-SU-2014:0788", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "name": "RHSA-2014:0594", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "name": "60415", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60415" }, { "name": "59408", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59408" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3469", "datePublished": "2014-06-05T20:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:43:06.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-10790
Vulnerability from cvelistv5
Published
2017-07-02 03:00
Modified
2024-08-05 17:50
Severity ?
EPSS score ?
Summary
The _asn1_check_identifier function in GNU Libtasn1 through 4.12 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure. It may lead to a remote denial of service attack.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201710-11 | vendor-advisory, x_refsource_GENTOO | |
https://usn.ubuntu.com/3547-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://bugzilla.redhat.com/show_bug.cgi?id=1464141 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4106 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2020/06/msg00026.html | mailing-list, x_refsource_MLIST | |
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | mailing-list, x_refsource_MLIST | |
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:50:11.680Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201710-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201710-11" }, { "name": "USN-3547-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3547-1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1464141" }, { "name": "DSA-4106", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4106" }, { "name": "[debian-lts-announce] 20200628 [SECURITY] [DLA 2255-1] libtasn1-6 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00026.html" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-07-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The _asn1_check_identifier function in GNU Libtasn1 through 4.12 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure. It may lead to a remote denial of service attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-29T14:08:07", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201710-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201710-11" }, { "name": "USN-3547-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3547-1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1464141" }, { "name": "DSA-4106", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4106" }, { "name": "[debian-lts-announce] 20200628 [SECURITY] [DLA 2255-1] libtasn1-6 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00026.html" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-10790", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The _asn1_check_identifier function in GNU Libtasn1 through 4.12 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure. It may lead to a remote denial of service attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201710-11", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201710-11" }, { "name": "USN-3547-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3547-1/" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1464141", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1464141" }, { "name": "DSA-4106", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4106" }, { "name": "[debian-lts-announce] 20200628 [SECURITY] [DLA 2255-1] libtasn1-6 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00026.html" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-10790", "datePublished": "2017-07-02T03:00:00", "dateReserved": "2017-07-01T00:00:00", "dateUpdated": "2024-08-05T17:50:11.680Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1000654
Vulnerability from cvelistv5
Published
2018-08-20 19:00
Modified
2024-08-05 12:40
Severity ?
EPSS score ?
Summary
GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.com/gnutls/libtasn1/issues/4 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/105151 | vdb-entry, x_refsource_BID | |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html | vendor-advisory, x_refsource_SUSE | |
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:40:47.874Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitlab.com/gnutls/libtasn1/issues/4" }, { "name": "105151", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105151" }, { "name": "openSUSE-SU-2019:1498", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html" }, { "name": "openSUSE-SU-2019:1510", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html" }, { "name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2018-08-19T00:00:00", "datePublic": "2018-08-12T00:00:00", "descriptions": [ { "lang": "en", "value": "GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-25T16:06:30", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitlab.com/gnutls/libtasn1/issues/4" }, { "name": "105151", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105151" }, { "name": "openSUSE-SU-2019:1498", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html" }, { "name": "openSUSE-SU-2019:1510", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html" }, { "name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2018-08-19T17:09:33.126155", "DATE_REQUESTED": "2018-08-12T23:08:51", "ID": "CVE-2018-1000654", "REQUESTER": "situlingyun@gmail.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitlab.com/gnutls/libtasn1/issues/4", "refsource": "CONFIRM", "url": "https://gitlab.com/gnutls/libtasn1/issues/4" }, { "name": "105151", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105151" }, { "name": "openSUSE-SU-2019:1498", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html" }, { "name": "openSUSE-SU-2019:1510", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html" }, { "name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-1000654", "datePublished": "2018-08-20T19:00:00", "dateReserved": "2018-08-12T00:00:00", "dateUpdated": "2024-08-05T12:40:47.874Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46848
Vulnerability from cvelistv5
Published
2022-10-24 00:00
Modified
2024-08-04 05:17
Severity ?
EPSS score ?
Summary
GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.362Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitlab.com/gnutls/libtasn1/-/commit/44a700d2051a666235748970c2df047ff207aeb5" }, { "tags": [ "x_transferred" ], "url": "https://gitlab.com/gnutls/libtasn1/-/issues/32" }, { "tags": [ "x_transferred" ], "url": "https://bugs.gentoo.org/866237" }, { "name": "FEDORA-2022-061f857481", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGO7XST4EIJGX4B2ITZCYSWM24534BSU/" }, { "name": "FEDORA-2022-3c933ffaca", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AV4SHDJF2XLB4CUPTBPQQ6CLGZ5LKXPZ/" }, { "name": "FEDORA-2022-19056934a7", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V5LWOGF7QRMNFRUCZY6TDYQJVFI6MOQ2/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20221118-0006/" }, { "name": "FEDORA-2022-3f9ee1ad91", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECM2ELTVRYV4BZ5L5GMIRQE27RFHPAQ6/" }, { "name": "[debian-lts-announce] 20230109 [SECURITY] [DLA 3263-1] libtasn1-6 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00003.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-09T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://gitlab.com/gnutls/libtasn1/-/commit/44a700d2051a666235748970c2df047ff207aeb5" }, { "url": "https://gitlab.com/gnutls/libtasn1/-/issues/32" }, { "url": "https://bugs.gentoo.org/866237" }, { "name": "FEDORA-2022-061f857481", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGO7XST4EIJGX4B2ITZCYSWM24534BSU/" }, { "name": "FEDORA-2022-3c933ffaca", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AV4SHDJF2XLB4CUPTBPQQ6CLGZ5LKXPZ/" }, { "name": "FEDORA-2022-19056934a7", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V5LWOGF7QRMNFRUCZY6TDYQJVFI6MOQ2/" }, { "url": "https://security.netapp.com/advisory/ntap-20221118-0006/" }, { "name": "FEDORA-2022-3f9ee1ad91", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECM2ELTVRYV4BZ5L5GMIRQE27RFHPAQ6/" }, { "name": "[debian-lts-announce] 20230109 [SECURITY] [DLA 3263-1] libtasn1-6 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00003.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-46848", "datePublished": "2022-10-24T00:00:00", "dateReserved": "2022-10-24T00:00:00", "dateUpdated": "2024-08-04T05:17:42.362Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6003
Vulnerability from cvelistv5
Published
2018-01-22 20:00
Modified
2024-08-05 05:47
Severity ?
EPSS score ?
Summary
An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.com/gnutls/libtasn1/commit/946565d8eb05fbf7970ea366e817581bb5a90910 | x_refsource_CONFIRM | |
https://bugzilla.suse.com/show_bug.cgi?id=1076832 | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=1535926 | x_refsource_CONFIRM | |
https://www.debian.org/security/2018/dsa-4106 | vendor-advisory, x_refsource_DEBIAN | |
http://git.savannah.nongnu.org/cgit/libtasn1.git/commit/?id=c593ae84cfcde8fea45787e53950e0ac71e9ca97 | x_refsource_CONFIRM | |
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | mailing-list, x_refsource_MLIST | |
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:47:56.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitlab.com/gnutls/libtasn1/commit/946565d8eb05fbf7970ea366e817581bb5a90910" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1076832" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535926" }, { "name": "DSA-4106", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4106" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.savannah.nongnu.org/cgit/libtasn1.git/commit/?id=c593ae84cfcde8fea45787e53950e0ac71e9ca97" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-01-22T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-29T14:08:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitlab.com/gnutls/libtasn1/commit/946565d8eb05fbf7970ea366e817581bb5a90910" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1076832" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535926" }, { "name": "DSA-4106", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4106" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.savannah.nongnu.org/cgit/libtasn1.git/commit/?id=c593ae84cfcde8fea45787e53950e0ac71e9ca97" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-6003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitlab.com/gnutls/libtasn1/commit/946565d8eb05fbf7970ea366e817581bb5a90910", "refsource": "CONFIRM", "url": "https://gitlab.com/gnutls/libtasn1/commit/946565d8eb05fbf7970ea366e817581bb5a90910" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1076832", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1076832" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1535926", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535926" }, { "name": "DSA-4106", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4106" }, { "name": "http://git.savannah.nongnu.org/cgit/libtasn1.git/commit/?id=c593ae84cfcde8fea45787e53950e0ac71e9ca97", "refsource": "CONFIRM", "url": "http://git.savannah.nongnu.org/cgit/libtasn1.git/commit/?id=c593ae84cfcde8fea45787e53950e0ac71e9ca97" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-6003", "datePublished": "2018-01-22T20:00:00", "dateReserved": "2018-01-22T00:00:00", "dateUpdated": "2024-08-05T05:47:56.174Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-3622
Vulnerability from cvelistv5
Published
2015-05-12 19:00
Modified
2024-08-06 05:47
Severity ?
EPSS score ?
Summary
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:47:57.733Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201509-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201509-04" }, { "name": "1032246", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032246" }, { "name": "FEDORA-2015-7288", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158225.html" }, { "name": "RHSA-2017:1860", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1860" }, { "name": "20150430 Heap overflow / invalid read in Libtasn1 before 4.5 (TFPA 005/2015)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Apr/109" }, { "name": "DSA-3256", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3256" }, { "name": "[help-libtasn1] 20150429 GNU Libtasn1 4.5 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.gnu.org/archive/html/help-libtasn1/2015-04/msg00000.html" }, { "name": "openSUSE-SU-2016:1567", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html" }, { "name": "MDVSA-2015:232", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:232" }, { "name": "openSUSE-SU-2015:1372", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00014.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/131711/libtasn1-Heap-Overflow.html" }, { "name": "74419", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/74419" }, { "name": "openSUSE-SU-2016:1674", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html" }, { "name": "USN-2604-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2604-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-04-29T00:00:00", "descriptions": [ { "lang": "en", "value": "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201509-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201509-04" }, { "name": "1032246", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032246" }, { "name": "FEDORA-2015-7288", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158225.html" }, { "name": "RHSA-2017:1860", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1860" }, { "name": "20150430 Heap overflow / invalid read in Libtasn1 before 4.5 (TFPA 005/2015)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Apr/109" }, { "name": "DSA-3256", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3256" }, { "name": "[help-libtasn1] 20150429 GNU Libtasn1 4.5 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.gnu.org/archive/html/help-libtasn1/2015-04/msg00000.html" }, { "name": "openSUSE-SU-2016:1567", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html" }, { "name": "MDVSA-2015:232", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:232" }, { "name": "openSUSE-SU-2015:1372", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00014.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/131711/libtasn1-Heap-Overflow.html" }, { "name": "74419", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/74419" }, { "name": "openSUSE-SU-2016:1674", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html" }, { "name": "USN-2604-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2604-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-3622", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201509-04", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201509-04" }, { "name": "1032246", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032246" }, { "name": "FEDORA-2015-7288", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158225.html" }, { "name": "RHSA-2017:1860", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1860" }, { "name": "20150430 Heap overflow / invalid read in Libtasn1 before 4.5 (TFPA 005/2015)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Apr/109" }, { "name": "DSA-3256", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3256" }, { "name": "[help-libtasn1] 20150429 GNU Libtasn1 4.5 released", "refsource": "MLIST", "url": "https://lists.gnu.org/archive/html/help-libtasn1/2015-04/msg00000.html" }, { "name": "openSUSE-SU-2016:1567", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html" }, { "name": "MDVSA-2015:232", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:232" }, { "name": "openSUSE-SU-2015:1372", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00014.html" }, { "name": "http://packetstormsecurity.com/files/131711/libtasn1-Heap-Overflow.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/131711/libtasn1-Heap-Overflow.html" }, { "name": "74419", "refsource": "BID", "url": "http://www.securityfocus.com/bid/74419" }, { "name": "openSUSE-SU-2016:1674", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html" }, { "name": "USN-2604-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2604-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-3622", "datePublished": "2015-05-12T19:00:00", "dateReserved": "2015-04-30T00:00:00", "dateUpdated": "2024-08-06T05:47:57.733Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-3467
Vulnerability from cvelistv5
Published
2014-06-05 20:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:43:06.499Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "60320", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60320" }, { "name": "DSA-3056", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3056" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "name": "59057", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59057" }, { "name": "SUSE-SU-2014:0758", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15423.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "name": "MDVSA-2015:116", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:116" }, { "name": "59021", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59021" }, { "name": "61888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61888" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0247.html" }, { "name": "RHSA-2014:0815", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "name": "RHSA-2014:0596", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0596.html" }, { "name": "[help-libtasn1] 20140525 GNU Libtasn1 3.6 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "name": "58591", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58591" }, { "name": "RHSA-2014:0687", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0687.html" }, { "name": "58614", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58614" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102022" }, { "name": "SUSE-SU-2014:0788", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "name": "RHSA-2014:0594", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "name": "60415", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60415" }, { "name": "59408", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59408" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-28T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "60320", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60320" }, { "name": "DSA-3056", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3056" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "name": "59057", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59057" }, { "name": "SUSE-SU-2014:0758", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15423.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "name": "MDVSA-2015:116", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:116" }, { "name": "59021", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59021" }, { "name": "61888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61888" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0247.html" }, { "name": "RHSA-2014:0815", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "name": "RHSA-2014:0596", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0596.html" }, { "name": "[help-libtasn1] 20140525 GNU Libtasn1 3.6 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "name": "58591", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58591" }, { "name": "RHSA-2014:0687", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0687.html" }, { "name": "58614", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58614" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102022" }, { "name": "SUSE-SU-2014:0788", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "name": "RHSA-2014:0594", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "name": "60415", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60415" }, { "name": "59408", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59408" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3467", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "60320", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60320" }, { "name": "DSA-3056", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3056" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015302", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "name": "59057", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59057" }, { "name": "SUSE-SU-2014:0758", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "name": "http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15423.html", "refsource": "CONFIRM", "url": "http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15423.html" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-0596.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "name": "MDVSA-2015:116", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:116" }, { "name": "59021", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59021" }, { "name": "61888", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61888" }, { "name": "http://advisories.mageia.org/MGASA-2014-0247.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0247.html" }, { "name": "RHSA-2014:0815", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "name": "RHSA-2014:0596", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0596.html" }, { "name": "[help-libtasn1] 20140525 GNU Libtasn1 3.6 released", "refsource": "MLIST", "url": "http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015303", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-0594.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "name": "58591", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58591" }, { "name": "RHSA-2014:0687", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0687.html" }, { "name": "58614", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58614" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1102022", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102022" }, { "name": "SUSE-SU-2014:0788", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "name": "RHSA-2014:0594", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "name": "60415", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60415" }, { "name": "59408", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59408" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3467", "datePublished": "2014-06-05T20:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:43:06.499Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-4008
Vulnerability from cvelistv5
Published
2016-05-05 18:00
Modified
2024-08-06 00:17
Severity ?
EPSS score ?
Summary
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:17:30.800Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201703-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201703-05" }, { "name": "FEDORA-2016-048ffb6235", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625" }, { "name": "USN-2957-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2957-2" }, { "name": "FEDORA-2016-383b8250e6", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html" }, { "name": "openSUSE-SU-2016:1567", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html" }, { "name": "[help-libtasn1] 20160411 GNU Libtasn1 4.8 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=f435825c0f527a8e52e6ffbc3ad0bc60531d537e" }, { "name": "DSA-3568", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3568" }, { "name": "openSUSE-SU-2016:1674", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html" }, { "name": "FEDORA-2016-96bfd9e873", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html" }, { "name": "USN-2957-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2957-1" }, { "name": "[oss-security] 20160411 Infinite loops parsing malicious DER certificates in libtasn1 4.7", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/04/11/3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-30T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201703-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201703-05" }, { "name": "FEDORA-2016-048ffb6235", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625" }, { "name": "USN-2957-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2957-2" }, { "name": "FEDORA-2016-383b8250e6", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html" }, { "name": "openSUSE-SU-2016:1567", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html" }, { "name": "[help-libtasn1] 20160411 GNU Libtasn1 4.8 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=f435825c0f527a8e52e6ffbc3ad0bc60531d537e" }, { "name": "DSA-3568", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3568" }, { "name": "openSUSE-SU-2016:1674", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html" }, { "name": "FEDORA-2016-96bfd9e873", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html" }, { "name": "USN-2957-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2957-1" }, { "name": "[oss-security] 20160411 Infinite loops parsing malicious DER certificates in libtasn1 4.7", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/04/11/3" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-4008", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201703-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201703-05" }, { "name": "FEDORA-2016-048ffb6235", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html" }, { "name": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625", "refsource": "CONFIRM", "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625" }, { "name": "USN-2957-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2957-2" }, { "name": "FEDORA-2016-383b8250e6", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html" }, { "name": "openSUSE-SU-2016:1567", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html" }, { "name": "[help-libtasn1] 20160411 GNU Libtasn1 4.8 released", "refsource": "MLIST", "url": "https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html" }, { "name": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e", "refsource": "CONFIRM", "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e" }, { "name": "DSA-3568", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3568" }, { "name": "openSUSE-SU-2016:1674", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html" }, { "name": "FEDORA-2016-96bfd9e873", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html" }, { "name": "USN-2957-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2957-1" }, { "name": "[oss-security] 20160411 Infinite loops parsing malicious DER certificates in libtasn1 4.7", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/04/11/3" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-4008", "datePublished": "2016-05-05T18:00:00", "dateReserved": "2016-04-13T00:00:00", "dateUpdated": "2024-08-06T00:17:30.800Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-6891
Vulnerability from cvelistv5
Published
2017-05-22 19:00
Modified
2024-08-05 15:41
Severity ?
EPSS score ?
Summary
Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Flexera Software LLC | GnuTLS libtasn1 |
Version: 4.10. Other versions may also be affected. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:41:17.677Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201710-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201710-11" }, { "name": "DSA-3861", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3861" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://secuniaresearch.flexerasoftware.com/advisories/76125/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-11/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=5520704d075802df25ce4ffccc010ba1641bd484" }, { "name": "98641", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98641" }, { "name": "1038619", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038619" }, { "name": "openSUSE-SU-2019:1510", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GnuTLS libtasn1", "vendor": "Flexera Software LLC", "versions": [ { "status": "affected", "version": "4.10. Other versions may also be affected." } ] } ], "datePublic": "2017-05-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Two errors in the \"asn1_find_node()\" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based buffer overflow leading to system compromise", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-29T14:07:27", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "GLSA-201710-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201710-11" }, { "name": "DSA-3861", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3861" }, { "tags": [ "x_refsource_MISC" ], "url": "https://secuniaresearch.flexerasoftware.com/advisories/76125/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-11/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=5520704d075802df25ce4ffccc010ba1641bd484" }, { "name": "98641", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98641" }, { "name": "1038619", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038619" }, { "name": "openSUSE-SU-2019:1510", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2017-6891", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GnuTLS libtasn1", "version": { "version_data": [ { "version_value": "4.10. Other versions may also be affected." } ] } } ] }, "vendor_name": "Flexera Software LLC" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Two errors in the \"asn1_find_node()\" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack-based buffer overflow leading to system compromise" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201710-11", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201710-11" }, { "name": "DSA-3861", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3861" }, { "name": "https://secuniaresearch.flexerasoftware.com/advisories/76125/", "refsource": "MISC", "url": "https://secuniaresearch.flexerasoftware.com/advisories/76125/" }, { "name": "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-11/", "refsource": "MISC", "url": "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-11/" }, { "name": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=5520704d075802df25ce4ffccc010ba1641bd484", "refsource": "CONFIRM", "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=5520704d075802df25ce4ffccc010ba1641bd484" }, { "name": "98641", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98641" }, { "name": "1038619", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038619" }, { "name": "openSUSE-SU-2019:1510", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2017-6891", "datePublished": "2017-05-22T19:00:00", "dateReserved": "2017-03-14T00:00:00", "dateUpdated": "2024-08-05T15:41:17.677Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-3468
Vulnerability from cvelistv5
Published
2014-06-05 20:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:43:06.299Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "60320", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60320" }, { "name": "DSA-3056", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3056" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=1c3ccb3e040bf13e342ee60bc23b21b97b11923f" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "name": "59057", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59057" }, { "name": "SUSE-SU-2014:0758", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15423.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "name": "MDVSA-2015:116", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:116" }, { "name": "59021", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59021" }, { "name": "61888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61888" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0247.html" }, { "name": "RHSA-2014:0815", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "name": "RHSA-2014:0596", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0596.html" }, { "name": "[help-libtasn1] 20140525 GNU Libtasn1 3.6 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102323" }, { "name": "58591", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58591" }, { "name": "RHSA-2014:0687", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0687.html" }, { "name": "58614", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58614" }, { "name": "SUSE-SU-2014:0788", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "name": "RHSA-2014:0594", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "name": "60415", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60415" }, { "name": "59408", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59408" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-28T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "60320", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60320" }, { "name": "DSA-3056", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3056" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=1c3ccb3e040bf13e342ee60bc23b21b97b11923f" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "name": "59057", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59057" }, { "name": "SUSE-SU-2014:0758", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15423.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "name": "MDVSA-2015:116", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:116" }, { "name": "59021", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59021" }, { "name": "61888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61888" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0247.html" }, { "name": "RHSA-2014:0815", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "name": "RHSA-2014:0596", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0596.html" }, { "name": "[help-libtasn1] 20140525 GNU Libtasn1 3.6 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102323" }, { "name": "58591", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58591" }, { "name": "RHSA-2014:0687", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0687.html" }, { "name": "58614", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58614" }, { "name": "SUSE-SU-2014:0788", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "name": "RHSA-2014:0594", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "name": "60415", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60415" }, { "name": "59408", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59408" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3468", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "60320", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60320" }, { "name": "DSA-3056", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3056" }, { "name": "http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=1c3ccb3e040bf13e342ee60bc23b21b97b11923f", "refsource": "CONFIRM", "url": "http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=1c3ccb3e040bf13e342ee60bc23b21b97b11923f" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015302", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "name": "59057", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59057" }, { "name": "SUSE-SU-2014:0758", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "name": "http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15423.html", "refsource": "CONFIRM", "url": "http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15423.html" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-0596.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "name": "MDVSA-2015:116", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:116" }, { "name": "59021", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59021" }, { "name": "61888", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61888" }, { "name": "http://advisories.mageia.org/MGASA-2014-0247.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0247.html" }, { "name": "RHSA-2014:0815", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "name": "RHSA-2014:0596", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0596.html" }, { "name": "[help-libtasn1] 20140525 GNU Libtasn1 3.6 released", "refsource": "MLIST", "url": "http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015303", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-0594.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1102323", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102323" }, { "name": "58591", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58591" }, { "name": "RHSA-2014:0687", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0687.html" }, { "name": "58614", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58614" }, { "name": "SUSE-SU-2014:0788", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "name": "RHSA-2014:0594", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "name": "60415", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60415" }, { "name": "59408", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59408" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3468", "datePublished": "2014-06-05T20:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:43:06.299Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-1569
Vulnerability from cvelistv5
Published
2012-03-26 19:00
Modified
2024-08-06 19:01
Severity ?
EPSS score ?
Summary
The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:01:02.196Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "57260", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57260" }, { "name": "RHSA-2012:0427", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0427.html" }, { "name": "48578", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48578" }, { "name": "RHSA-2012:0531", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html" }, { "name": "49002", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49002" }, { "name": "FEDORA-2012-4357", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077339.html" }, { "name": "[oss-security] 20120320 Re: CVE request: libtasn1 \"asn1_get_length_der()\" DER decoding issue", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/20/8" }, { "name": "[oss-security] 20120321 Re: CVE request: GnuTLS TLS record handling issue / MU-201202-01", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/21/5" }, { "name": "48488", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48488" }, { "name": "USN-1436-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1436-1" }, { "name": "FEDORA-2012-4342", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/076865.html" }, { "name": "FEDORA-2012-4451", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077284.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.gnu.org/software/gnutls/security.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804920" }, { "name": "RHSA-2012:0488", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0488.html" }, { "name": "FEDORA-2012-4308", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/076856.html" }, { "name": "SUSE-SU-2014:0320", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" }, { "name": "[gnutls-devel] 20120316 gnutls 3.0.16", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5932" }, { "name": "1026829", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026829" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "name": "48596", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48596" }, { "name": "50739", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50739" }, { "name": "48397", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48397" }, { "name": "48505", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48505" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.mudynamics.com/2012/03/20/gnutls-and-libtasn1-vulns/" }, { "name": "[help-libtasn1] 20120319 GNU Libtasn1 2.12 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://article.gmane.org/gmane.comp.gnu.libtasn1.general/53" }, { "name": "[help-libtasn1] 20120319 minimal fix to security issue", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://article.gmane.org/gmane.comp.gnu.libtasn1.general/54" }, { "name": "[oss-security] 20120320 CVE request: libtasn1 \"asn1_get_length_der()\" DER decoding issue", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/20/3" }, { "name": "DSA-2440", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2440" }, { "name": "MDVSA-2012:039", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:039" }, { "name": "FEDORA-2012-4409", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076699.html" }, { "name": "20120320 Mu Dynamics, Inc. Security Advisories MU-201202-01 and MU-201202-02 for GnuTLS and Libtasn1", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0099.html" }, { "name": "FEDORA-2012-4417", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078207.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-17T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "57260", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57260" }, { "name": "RHSA-2012:0427", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0427.html" }, { "name": "48578", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48578" }, { "name": "RHSA-2012:0531", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html" }, { "name": "49002", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49002" }, { "name": "FEDORA-2012-4357", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077339.html" }, { "name": "[oss-security] 20120320 Re: CVE request: libtasn1 \"asn1_get_length_der()\" DER decoding issue", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/20/8" }, { "name": "[oss-security] 20120321 Re: CVE request: GnuTLS TLS record handling issue / MU-201202-01", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/21/5" }, { "name": "48488", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48488" }, { "name": "USN-1436-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1436-1" }, { "name": "FEDORA-2012-4342", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/076865.html" }, { "name": "FEDORA-2012-4451", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077284.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.gnu.org/software/gnutls/security.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804920" }, { "name": "RHSA-2012:0488", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0488.html" }, { "name": "FEDORA-2012-4308", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/076856.html" }, { "name": "SUSE-SU-2014:0320", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" }, { "name": "[gnutls-devel] 20120316 gnutls 3.0.16", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5932" }, { "name": "1026829", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026829" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "name": "48596", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48596" }, { "name": "50739", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50739" }, { "name": "48397", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48397" }, { "name": "48505", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48505" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.mudynamics.com/2012/03/20/gnutls-and-libtasn1-vulns/" }, { "name": "[help-libtasn1] 20120319 GNU Libtasn1 2.12 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://article.gmane.org/gmane.comp.gnu.libtasn1.general/53" }, { "name": "[help-libtasn1] 20120319 minimal fix to security issue", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://article.gmane.org/gmane.comp.gnu.libtasn1.general/54" }, { "name": "[oss-security] 20120320 CVE request: libtasn1 \"asn1_get_length_der()\" DER decoding issue", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/20/3" }, { "name": "DSA-2440", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2440" }, { "name": "MDVSA-2012:039", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:039" }, { "name": "FEDORA-2012-4409", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076699.html" }, { "name": "20120320 Mu Dynamics, Inc. Security Advisories MU-201202-01 and MU-201202-02 for GnuTLS and Libtasn1", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0099.html" }, { "name": "FEDORA-2012-4417", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078207.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-1569", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "57260", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57260" }, { "name": "RHSA-2012:0427", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0427.html" }, { "name": "48578", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48578" }, { "name": "RHSA-2012:0531", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html" }, { "name": "49002", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49002" }, { "name": "FEDORA-2012-4357", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077339.html" }, { "name": "[oss-security] 20120320 Re: CVE request: libtasn1 \"asn1_get_length_der()\" DER decoding issue", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/03/20/8" }, { "name": "[oss-security] 20120321 Re: CVE request: GnuTLS TLS record handling issue / MU-201202-01", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/03/21/5" }, { "name": "48488", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48488" }, { "name": "USN-1436-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1436-1" }, { "name": "FEDORA-2012-4342", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/076865.html" }, { "name": "FEDORA-2012-4451", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077284.html" }, { "name": "http://www.gnu.org/software/gnutls/security.html", "refsource": "CONFIRM", "url": "http://www.gnu.org/software/gnutls/security.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=804920", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804920" }, { "name": "RHSA-2012:0488", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0488.html" }, { "name": "FEDORA-2012-4308", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/076856.html" }, { "name": "SUSE-SU-2014:0320", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" }, { "name": "[gnutls-devel] 20120316 gnutls 3.0.16", "refsource": "MLIST", "url": "http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5932" }, { "name": "1026829", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026829" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-0596.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html" }, { "name": "48596", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48596" }, { "name": "50739", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/50739" }, { "name": "48397", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48397" }, { "name": "48505", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48505" }, { "name": "http://blog.mudynamics.com/2012/03/20/gnutls-and-libtasn1-vulns/", "refsource": "MISC", "url": "http://blog.mudynamics.com/2012/03/20/gnutls-and-libtasn1-vulns/" }, { "name": "[help-libtasn1] 20120319 GNU Libtasn1 2.12 released", "refsource": "MLIST", "url": "http://article.gmane.org/gmane.comp.gnu.libtasn1.general/53" }, { "name": "[help-libtasn1] 20120319 minimal fix to security issue", "refsource": "MLIST", "url": "http://article.gmane.org/gmane.comp.gnu.libtasn1.general/54" }, { "name": "[oss-security] 20120320 CVE request: libtasn1 \"asn1_get_length_der()\" DER decoding issue", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/03/20/3" }, { "name": "DSA-2440", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2440" }, { "name": "MDVSA-2012:039", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:039" }, { "name": "FEDORA-2012-4409", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076699.html" }, { "name": "20120320 Mu Dynamics, Inc. Security Advisories MU-201202-01 and MU-201202-02 for GnuTLS and Libtasn1", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0099.html" }, { "name": "FEDORA-2012-4417", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078207.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1569", "datePublished": "2012-03-26T19:00:00", "dateReserved": "2012-03-12T00:00:00", "dateUpdated": "2024-08-06T19:01:02.196Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }