Computer Security
[EN] securityvulns.ru no-pyccku


GnuTLS and libtasn1 multiple security vulnerabilities
Published:02.06.2014
Source:
SecurityVulns ID:13806
Type:library
Threat Level:
8/10
Description:Buffer overflows, integer overflows, NULL pointer dereference.
Affected:GNU : GnuTLS 3.2
 LIBTASN1 : libtasn1 3.6
CVE:CVE-2014-3469 (The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.)
 CVE-2014-3468 (The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.)
 CVE-2014-3467 (Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnutTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.)
 CVE-2014-3466 (Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.)
 CVE-2014-3465 (The gnutls_x509_dn_oid_name function in lib/x509/common.c in GnuTLS 3.0 before 3.1.20 and 3.2.x before 3.2.10 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted X.509 certificate, related to a missing LDAP description for an OID when printing the DN.)
Original documentdocumentTomas Hoger, [oss-security] GnuTLS and libtasn1 security fixes (02.06.2014)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod