Vulnerabilities
Vulnerable Software
Gnu:  >> Libtasn1  >> 4.12  Security Vulnerabilities
GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.
CVSS Score
9.1
EPSS Score
0.003
Published
2022-10-24
GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file.
CVSS Score
5.5
EPSS Score
0.001
Published
2018-08-20
An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS.
CVSS Score
7.5
EPSS Score
0.016
Published
2018-01-22
The _asn1_check_identifier function in GNU Libtasn1 through 4.12 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure. It may lead to a remote denial of service attack.
CVSS Score
7.5
EPSS Score
0.008
Published
2017-07-02


Contact Us

Shodan ® - All rights reserved