GNU Libtasn1 4.10

CPE Details

GNU Libtasn1 4.10
4.10
2017-08-26
07h24 +00:00
2022-12-05
22h48 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:gnu:libtasn1:4.10:*:*:*:*:*:*:*

Informations

Vendor

gnu

Product

libtasn1

Version

4.10

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-46848 2022-10-23 22h00 +00:00 GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.
9.1
Critique
CVE-2018-6003 2018-01-22 19h00 +00:00 An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS.
7.5
Haute
CVE-2017-10790 2017-07-02 01h00 +00:00 The _asn1_check_identifier function in GNU Libtasn1 through 4.12 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure. It may lead to a remote denial of service attack.
7.5
Haute
CVE-2017-6891 2017-05-22 17h00 +00:00 Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.
8.8
Haute