Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-1569

Опубликовано: 19 мар. 2012
Источник: redhat
CVSS2: 5

Описание

The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4gnutlsWill not fix
Red Hat Enterprise Linux 6mingw32-gnutlsWill not fix
Red Hat Enterprise Linux 7libtasn1Not affected
Red Hat Enterprise Linux 5gnutlsFixedRHSA-2012:042827.03.2012
Red Hat Enterprise Linux 6libtasn1FixedRHSA-2012:042727.03.2012
RHEV 3.X Hypervisor and Agents for RHEL-6rhev-hypervisor6FixedRHSA-2012:053130.04.2012

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=804920libtasn1: DER decoding buffer overflow (GNUTLS-SA-2012-3, MU-201202-02)

5 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 13 лет назад

The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.

nvd
больше 13 лет назад

The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.

debian
больше 13 лет назад

The asn1_get_length_der function in decoding.c in GNU Libtasn1 before ...

github
больше 3 лет назад

The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.

oracle-oval
больше 13 лет назад

ELSA-2012-0427: libtasn1 security update (IMPORTANT)

5 Medium

CVSS2