Description
Tiny ASN.1 Library (libtasn1) before 0.2.18, as used by (1) GnuTLS 1.2.x before 1.2.10 and 1.3.x before 1.3.4, and (2) GNU Shishi, allows attackers to crash the DER decoder and possibly execute arbitrary code via "out-of-bounds access" caused by invalid input, as demonstrated by the ProtoVer SSL test suite.
Published: 2006-02-10
Score: 7.5 High
EPSS: 3.7% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-985-1 New libtasn1-2 packages fix arbitrary code execution
Debian DSA Debian DSA DSA-986-1 New gnutls11 packages fix arbitrary code execution
EUVD EUVD EUVD-2006-0652 Tiny ASN.1 Library (libtasn1) before 0.2.18, as used by (1) GnuTLS 1.2.x before 1.2.10 and 1.3.x before 1.3.4, and (2) GNU Shishi, allows attackers to crash the DER decoder and possibly execute arbitrary code via "out-of-bounds access" caused by invalid input, as demonstrated by the ProtoVer SSL test suite.
Ubuntu USN Ubuntu USN USN-251-1 libtasn vulnerability
References
Link Providers
http://josefsson.org/cgi-bin/viewcvs.cgi/gnutls/tests/certder.c?view=markup cve-icon cve-icon
http://josefsson.org/cgi-bin/viewcvs.cgi/libtasn1/NEWS?root=gnupg-mirror&view=markup cve-icon cve-icon
http://josefsson.org/gnutls/releases/libtasn1/libtasn1-0.2.18-from-0.2.17.patch cve-icon cve-icon
http://lists.gnupg.org/pipermail/gnutls-dev/2006-February/001058.html cve-icon cve-icon
http://lists.gnupg.org/pipermail/gnutls-dev/2006-February/001059.html cve-icon cve-icon
http://lists.gnupg.org/pipermail/gnutls-dev/2006-February/001060.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2006-0207.html cve-icon cve-icon
http://secunia.com/advisories/18794 cve-icon cve-icon
http://secunia.com/advisories/18815 cve-icon cve-icon
http://secunia.com/advisories/18830 cve-icon cve-icon
http://secunia.com/advisories/18832 cve-icon cve-icon
http://secunia.com/advisories/18898 cve-icon cve-icon
http://secunia.com/advisories/18918 cve-icon cve-icon
http://secunia.com/advisories/19080 cve-icon cve-icon
http://secunia.com/advisories/19092 cve-icon cve-icon
http://securityreason.com/securityalert/446 cve-icon cve-icon
http://securitytracker.com/id?1015612 cve-icon cve-icon
http://www.debian.org/security/2006/dsa-985 cve-icon cve-icon
http://www.debian.org/security/2006/dsa-986 cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200602-08.xml cve-icon cve-icon
http://www.gleg.net/protover_ssl.shtml cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2006:039 cve-icon cve-icon
http://www.osvdb.org/23054 cve-icon cve-icon
http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00043.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/424538/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/16568 cve-icon cve-icon
http://www.trustix.org/errata/2006/0008 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/0496 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/24606 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2006-0645 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10540 cve-icon cve-icon
https://usn.ubuntu.com/251-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2006-0645 cve-icon
History

No history.

Subscriptions

Free Software Foundation Inc. Libtasn1
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T16:41:29.006Z

Reserved: 2006-02-10T00:00:00.000Z

Link: CVE-2006-0645

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2006-02-10T18:06:00.000

Modified: 2026-04-16T00:27:16.627

Link: CVE-2006-0645

cve-icon Redhat

Severity : Important

Publid Date: 2006-02-09T15:38:00Z

Links: CVE-2006-0645 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses