Описание
Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| libtasn1-6 | fixed | 4.4-1 | experimental | package |
| libtasn1-6 | fixed | 4.2-3 | package | |
| libtasn1-3 | removed | package |
Примечания
https://gitlab.com/gnutls/libtasn1/commit/4d4f992826a4962790ecd0cce6fbba4a415ce149
https://www.openwall.com/lists/oss-security/2015/03/29/4
Only in the asn1 definition parser, not in the asn1 parser itself
https://lists.gnu.org/archive/html/help-libtasn1/2015-01/msg00000.html
EPSS
Связанные уязвимости
Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.
Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.
Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.
Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.
EPSS