rpm package
suse/libtasn1&distro=SUSE Linux Enterprise Server 12 SP4
pkg:rpm/suse/libtasn1&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4
Vulnerabilities (2)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2018-1000654 | — | < 4.9-3.10.1 | 4.9-3.10.1 | Aug 20, 2018 | GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears | ||
| CVE-2017-6891 | Hig | 8.8 | < 4.9-3.10.1 | 4.9-3.10.1 | May 22, 2017 | Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility. |
- CVE-2018-1000654Aug 20, 2018affected < 4.9-3.10.1fixed 4.9-3.10.1
GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears
- affected < 4.9-3.10.1fixed 4.9-3.10.1
Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.