Two errors in "asn1_find_node()" function in GnuTLS libtasn1 v4.10 cause stack-based buffer overflow via crafted assignments file
Reporter | Title | Published | Views | Family All 65 |
---|---|---|---|---|
![]() | [SECURITY] [DLA 950-1] libtasn1-3 security update | 23 May 201720:37 | – | debian |
![]() | [SECURITY] [DSA 3861-1] libtasn1-6 security update | 24 May 201711:10 | – | debian |
![]() | [SECURITY] [DSA 3861-1] libtasn1-6 security update | 24 May 201711:10 | – | debian |
![]() | Huawei EulerOS: Security Advisory for libtasn1 (EulerOS-SA-2019-1082) | 23 Jan 202000:00 | – | openvas |
![]() | Mageia: Security Advisory (MGASA-2017-0159) | 28 Jan 202200:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for libtasn1 (EulerOS-SA-2019-1312) | 23 Jan 202000:00 | – | openvas |
![]() | Fedora Update for libtasn1 FEDORA-2017-c7c3f7ed26 | 6 Jun 201700:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for libtasn1 (EulerOS-SA-2018-1334) | 23 Jan 202000:00 | – | openvas |
![]() | Debian: Security Advisory (DLA-950-1) | 24 Jan 201800:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for libtasn1 (EulerOS-SA-2019-1311) | 23 Jan 202000:00 | – | openvas |
[
{
"product": "GnuTLS libtasn1",
"vendor": "Flexera Software LLC",
"versions": [
{
"status": "affected",
"version": "4.10. Other versions may also be affected."
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo