The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2012-03/0099.html - | |
References | () http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5932 - Patch | |
References | () http://article.gmane.org/gmane.comp.gnu.libtasn1.general/53 - | |
References | () http://article.gmane.org/gmane.comp.gnu.libtasn1.general/54 - | |
References | () http://blog.mudynamics.com/2012/03/20/gnutls-and-libtasn1-vulns/ - Exploit | |
References | () http://linux.oracle.com/errata/ELSA-2014-0596.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/076856.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/076865.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077284.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077339.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078207.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076699.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0427.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0488.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0531.html - | |
References | () http://secunia.com/advisories/48397 - | |
References | () http://secunia.com/advisories/48488 - | |
References | () http://secunia.com/advisories/48505 - | |
References | () http://secunia.com/advisories/48578 - | |
References | () http://secunia.com/advisories/48596 - | |
References | () http://secunia.com/advisories/49002 - | |
References | () http://secunia.com/advisories/50739 - | |
References | () http://secunia.com/advisories/57260 - | |
References | () http://www.debian.org/security/2012/dsa-2440 - | |
References | () http://www.gnu.org/software/gnutls/security.html - Vendor Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2012:039 - | |
References | () http://www.openwall.com/lists/oss-security/2012/03/20/3 - | |
References | () http://www.openwall.com/lists/oss-security/2012/03/20/8 - | |
References | () http://www.openwall.com/lists/oss-security/2012/03/21/5 - | |
References | () http://www.securitytracker.com/id?1026829 - | |
References | () http://www.ubuntu.com/usn/USN-1436-1 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=804920 - |
Information
Published : 2012-03-26 19:55
Updated : 2024-11-21 01:37
NVD link : CVE-2012-1569
Mitre link : CVE-2012-1569
CVE.ORG link : CVE-2012-1569
JSON object : View
Products Affected
gnu
- libtasn1
- gnutls
CWE
CWE-189
Numeric Errors