rpm package
suse/libtasn1&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP4
pkg:rpm/suse/libtasn1&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4
Vulnerabilities (3)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2021-46848 | — | < 4.9-3.13.1 | 4.9-3.13.1 | Oct 24, 2022 | GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der. | ||
| CVE-2018-1000654 | — | < 4.9-3.10.1 | 4.9-3.10.1 | Aug 20, 2018 | GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears | ||
| CVE-2017-6891 | Hig | 8.8 | < 4.9-3.10.1 | 4.9-3.10.1 | May 22, 2017 | Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility. |
- CVE-2021-46848Oct 24, 2022affected < 4.9-3.13.1fixed 4.9-3.13.1
GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.
- CVE-2018-1000654Aug 20, 2018affected < 4.9-3.10.1fixed 4.9-3.10.1
GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears
- affected < 4.9-3.10.1fixed 4.9-3.10.1
Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.