Description
The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2440-1 | libtasn1-3 security update |
Ubuntu USN |
USN-1436-1 | Libtasn1 vulnerability |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T19:01:02.196Z
Reserved: 2012-03-12T00:00:00.000Z
Link: CVE-2012-1569
No data.
Status : Deferred
Published: 2012-03-26T19:55:01.110
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-1569
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN