The asn1_get_sequence_of function in library/asn1parse.c in PolarSSL 1.0 through 1.2.12 and 1.3.x through 1.3.9 does not properly initialize a pointer in the asn1_sequence linked list, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ASN.1 sequence in a certificate.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148829.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148903.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2015-02/msg00003.html - | |
References | () http://secunia.com/advisories/62270 - | |
References | () http://secunia.com/advisories/62610 - | |
References | () http://www.debian.org/security/2015/dsa-3136 - Vendor Advisory | |
References | () https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2014-04 - Vendor Advisory | |
References | () https://security.gentoo.org/glsa/201801-15 - |
Information
Published : 2015-01-27 20:59
Updated : 2024-11-21 02:24
NVD link : CVE-2015-1182
Mitre link : CVE-2015-1182
CVE.ORG link : CVE-2015-1182
JSON object : View
Products Affected
polarssl
- polarssl
opensuse
- opensuse
CWE