SB2012092503 - Gentoo update for Libtasn1



SB2012092503 - Gentoo update for Libtasn1

Published: September 25, 2012 Updated: September 25, 2016

Security Bulletin ID SB2012092503
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Input validation error (CVE-ID: CVE-2012-1569)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.


Remediation

Install update from vendor's website.