Tiny ASN.1 Library (libtasn1) before 0.2.18, as used by (1) GnuTLS 1.2.x before 1.2.10 and 1.3.x before 1.3.4, and (2) GNU Shishi, allows attackers to crash the DER decoder and possibly execute arbitrary code via "out-of-bounds access" caused by invalid input, as demonstrated by the ProtoVer SSL test suite.
References
Link Providers
http://josefsson.org/cgi-bin/viewcvs.cgi/gnutls/tests/certder.c?view=markup cve-icon cve-icon
http://josefsson.org/cgi-bin/viewcvs.cgi/libtasn1/NEWS?root=gnupg-mirror&view=markup cve-icon cve-icon
http://josefsson.org/gnutls/releases/libtasn1/libtasn1-0.2.18-from-0.2.17.patch cve-icon cve-icon
http://lists.gnupg.org/pipermail/gnutls-dev/2006-February/001058.html cve-icon cve-icon
http://lists.gnupg.org/pipermail/gnutls-dev/2006-February/001059.html cve-icon cve-icon
http://lists.gnupg.org/pipermail/gnutls-dev/2006-February/001060.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2006-0207.html cve-icon cve-icon
http://secunia.com/advisories/18794 cve-icon cve-icon
http://secunia.com/advisories/18815 cve-icon cve-icon
http://secunia.com/advisories/18830 cve-icon cve-icon
http://secunia.com/advisories/18832 cve-icon cve-icon
http://secunia.com/advisories/18898 cve-icon cve-icon
http://secunia.com/advisories/18918 cve-icon cve-icon
http://secunia.com/advisories/19080 cve-icon cve-icon
http://secunia.com/advisories/19092 cve-icon cve-icon
http://securityreason.com/securityalert/446 cve-icon cve-icon
http://securitytracker.com/id?1015612 cve-icon cve-icon
http://www.debian.org/security/2006/dsa-985 cve-icon cve-icon
http://www.debian.org/security/2006/dsa-986 cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200602-08.xml cve-icon cve-icon
http://www.gleg.net/protover_ssl.shtml cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2006:039 cve-icon cve-icon
http://www.osvdb.org/23054 cve-icon cve-icon
http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00043.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/424538/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/16568 cve-icon cve-icon
http://www.trustix.org/errata/2006/0008 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/0496 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/24606 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2006-0645 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10540 cve-icon cve-icon
https://usn.ubuntu.com/251-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2006-0645 cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2006-02-10T18:00:00

Updated: 2024-08-07T16:41:29.006Z

Reserved: 2006-02-10T00:00:00

Link: CVE-2006-0645

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2006-02-10T18:06:00.000

Modified: 2018-10-19T15:45:41.427

Link: CVE-2006-0645

cve-icon Redhat

Severity : Important

Publid Date: 2006-02-09T15:38:00Z

Links: CVE-2006-0645 - Bugzilla