Lucene search

K
debianDebianDEBIAN:DSA-3220-1:F2164
HistoryApr 11, 2015 - 9:19 p.m.

[SECURITY] [DSA 3220-1] libtasn1-3 security update

2015-04-1121:19:31
lists.debian.org
14

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.014 Low

EPSS

Percentile

86.1%


Debian Security Advisory DSA-3220-1 [email protected]
http://www.debian.org/security/ Salvatore Bonaccorso
April 11, 2015 http://www.debian.org/security/faq


Package : libtasn1-3
CVE ID : CVE-2015-2806

Hanno Boeck discovered a stack-based buffer overflow in the
asn1_der_decoding function in Libtasn1, a library to manage ASN.1
structures. A remote attacker could take advantage of this flaw to cause
an application using the Libtasn1 library to crash, or potentially to
execute arbitrary code.

For the stable distribution (wheezy), this problem has been fixed in
version 2.13-2+deb7u2.

We recommend that you upgrade your libtasn1-3 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

OSVersionArchitecturePackageVersionFilename
Debian7alllibtasn1-3< 2.13-2+deb7u2libtasn1-3_2.13-2+deb7u2_all.deb

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.014 Low

EPSS

Percentile

86.1%