Tiny ASN.1 Library (libtasn1) before 0.2.18, as used by (1) GnuTLS 1.2.x before 1.2.10 and 1.3.x before 1.3.4, and (2) GNU Shishi, allows attackers to crash the DER decoder and possibly execute arbitrary code via "out-of-bounds access" caused by invalid input, as demonstrated by the ProtoVer SSL test suite.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-985-1 New libtasn1-2 packages fix arbitrary code execution
Debian DSA Debian DSA DSA-986-1 New gnutls11 packages fix arbitrary code execution
EUVD EUVD EUVD-2006-0652 Tiny ASN.1 Library (libtasn1) before 0.2.18, as used by (1) GnuTLS 1.2.x before 1.2.10 and 1.3.x before 1.3.4, and (2) GNU Shishi, allows attackers to crash the DER decoder and possibly execute arbitrary code via "out-of-bounds access" caused by invalid input, as demonstrated by the ProtoVer SSL test suite.
Ubuntu USN Ubuntu USN USN-251-1 libtasn vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://josefsson.org/cgi-bin/viewcvs.cgi/gnutls/tests/certder.c?view=markup cve-icon cve-icon
http://josefsson.org/cgi-bin/viewcvs.cgi/libtasn1/NEWS?root=gnupg-mirror&view=markup cve-icon cve-icon
http://josefsson.org/gnutls/releases/libtasn1/libtasn1-0.2.18-from-0.2.17.patch cve-icon cve-icon
http://lists.gnupg.org/pipermail/gnutls-dev/2006-February/001058.html cve-icon cve-icon
http://lists.gnupg.org/pipermail/gnutls-dev/2006-February/001059.html cve-icon cve-icon
http://lists.gnupg.org/pipermail/gnutls-dev/2006-February/001060.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2006-0207.html cve-icon cve-icon
http://secunia.com/advisories/18794 cve-icon cve-icon
http://secunia.com/advisories/18815 cve-icon cve-icon
http://secunia.com/advisories/18830 cve-icon cve-icon
http://secunia.com/advisories/18832 cve-icon cve-icon
http://secunia.com/advisories/18898 cve-icon cve-icon
http://secunia.com/advisories/18918 cve-icon cve-icon
http://secunia.com/advisories/19080 cve-icon cve-icon
http://secunia.com/advisories/19092 cve-icon cve-icon
http://securityreason.com/securityalert/446 cve-icon cve-icon
http://securitytracker.com/id?1015612 cve-icon cve-icon
http://www.debian.org/security/2006/dsa-985 cve-icon cve-icon
http://www.debian.org/security/2006/dsa-986 cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200602-08.xml cve-icon cve-icon
http://www.gleg.net/protover_ssl.shtml cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2006:039 cve-icon cve-icon
http://www.osvdb.org/23054 cve-icon cve-icon
http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00043.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/424538/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/16568 cve-icon cve-icon
http://www.trustix.org/errata/2006/0008 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/0496 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/24606 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2006-0645 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10540 cve-icon cve-icon
https://usn.ubuntu.com/251-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2006-0645 cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T16:41:29.006Z

Reserved: 2006-02-10T00:00:00

Link: CVE-2006-0645

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2006-02-10T18:06:00.000

Modified: 2025-04-03T01:03:51.193

Link: CVE-2006-0645

cve-icon Redhat

Severity : Important

Publid Date: 2006-02-09T15:38:00Z

Links: CVE-2006-0645 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses