Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-0427

Опубликовано: 27 мар. 2012
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2012-0427: libtasn1 security update (IMPORTANT)

[2.3-3.1]

  • fix CVE-2012-1569 - missing length check when decoding DER lengths (#804920)

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

libtasn1

2.3-3.el6_2.1

libtasn1-devel

2.3-3.el6_2.1

libtasn1-tools

2.3-3.el6_2.1

Oracle Linux i686

libtasn1

2.3-3.el6_2.1

libtasn1-devel

2.3-3.el6_2.1

libtasn1-tools

2.3-3.el6_2.1

Связанные CVE

Связанные уязвимости

ubuntu
больше 13 лет назад

The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.

redhat
больше 13 лет назад

The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.

nvd
больше 13 лет назад

The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.

debian
больше 13 лет назад

The asn1_get_length_der function in decoding.c in GNU Libtasn1 before ...

github
больше 3 лет назад

The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.