Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-6891

Опубликовано: 18 мая 2017
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.

Отчет

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libtasn1Will not fix
Red Hat Enterprise Linux 7libtasn1Will not fix
Red Hat Enterprise Virtualization 3mingw-virt-viewerWill not fix
Red Hat Satellite 6libtasn1Will not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1456763libtasn1: Stack-based buffer overflow in asn1_find_node()

EPSS

Процентиль: 83%
0.01917
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 8 лет назад

Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.

CVSS3: 8.8
nvd
больше 8 лет назад

Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.

CVSS3: 8.8
debian
больше 8 лет назад

Two errors in the "asn1_find_node()" function (lib/parser_aux.c) withi ...

CVSS3: 8.8
github
больше 3 лет назад

Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.

suse-cvrf
больше 6 лет назад

Security update for libtasn1

EPSS

Процентиль: 83%
0.01917
Низкий

7.8 High

CVSS3