ID CVE-2015-5727
Summary The BER decoder in Botan 1.10.x before 1.10.10 and 1.11.x before 1.11.19 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors, related to a length field.
References
Vulnerable Configurations
  • Botan 1.11.18
    cpe:2.3:a:botan_project:botan:1.11.18
  • Botan 1.11.17
    cpe:2.3:a:botan_project:botan:1.11.17
  • Botan 1.11.16
    cpe:2.3:a:botan_project:botan:1.11.16
  • Botan 1.11.15
    cpe:2.3:a:botan_project:botan:1.11.15
  • Botan 1.11.14
    cpe:2.3:a:botan_project:botan:1.11.14
  • Botan 1.11.13
    cpe:2.3:a:botan_project:botan:1.11.13
  • Botan 1.11.12
    cpe:2.3:a:botan_project:botan:1.11.12
  • Botan 1.11.11
    cpe:2.3:a:botan_project:botan:1.11.11
  • Botan 1.11.10
    cpe:2.3:a:botan_project:botan:1.11.10
  • Botan 1.11.9
    cpe:2.3:a:botan_project:botan:1.11.9
  • Botan 1.11.8
    cpe:2.3:a:botan_project:botan:1.11.8
  • Botan 1.11.7
    cpe:2.3:a:botan_project:botan:1.11.7
  • Botan 1.11.6
    cpe:2.3:a:botan_project:botan:1.11.6
  • Botan 1.11.5
    cpe:2.3:a:botan_project:botan:1.11.5
  • Botan 1.11.4
    cpe:2.3:a:botan_project:botan:1.11.4
  • Botan 1.11.3
    cpe:2.3:a:botan_project:botan:1.11.3
  • Botan 1.11.2
    cpe:2.3:a:botan_project:botan:1.11.2
  • Botan 1.11.1
    cpe:2.3:a:botan_project:botan:1.11.1
  • Botan 1.11.0
    cpe:2.3:a:botan_project:botan:1.11.0
  • Botan 1.10.9
    cpe:2.3:a:botan_project:botan:1.10.9
  • Botan 1.10.8
    cpe:2.3:a:botan_project:botan:1.10.8
  • Botan 1.10.7
    cpe:2.3:a:botan_project:botan:1.10.7
  • Botan 1.10.6
    cpe:2.3:a:botan_project:botan:1.10.6
  • Botan 1.10.5
    cpe:2.3:a:botan_project:botan:1.10.5
  • Botan 1.10.4
    cpe:2.3:a:botan_project:botan:1.10.4
  • Botan 1.10.3
    cpe:2.3:a:botan_project:botan:1.10.3
  • Botan 1.10.2
    cpe:2.3:a:botan_project:botan:1.10.2
  • Botan 1.10.1
    cpe:2.3:a:botan_project:botan:1.10.1
  • Botan 1.10.0
    cpe:2.3:a:botan_project:botan:1.10.0
  • Debian Linux 8.0 (Jessie)
    cpe:2.3:o:debian:debian_linux:8.0
CVSS
Base: 7.8 (as of 13-05-2016 - 14:46)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
nessus via4
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_2004616DF66C11E5B94C001999F8D30B.NASL
    description The botan developers reports : Excess memory allocation in BER decoder - The BER decoder would allocate a fairly arbitrary amount of memory in a length field, even if there was no chance the read request would succeed. This might cause the process to run out of memory or invoke the OOM killer. Crash in BER decoder - The BER decoder would crash due to reading from offset 0 of an empty vector if it encountered a BIT STRING which did not contain any data at all. This can be used to easily crash applications reading untrusted ASN.1 data, but does not seem exploitable for code execution.
    last seen 2017-10-29
    modified 2016-10-19
    plugin id 90286
    published 2016-04-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=90286
    title FreeBSD : Botan BER Decoder vulnerabilities (2004616d-f66c-11e5-b94c-001999f8d30b)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-3565.NASL
    description Several security vulnerabilities were found in botan1.10, a C++ library which provides support for many common cryptographic operations, including encryption, authentication, X.509v3 certificates and CRLs. - CVE-2015-5726 The BER decoder would crash due to reading from offset 0 of an empty vector if it encountered a BIT STRING which did not contain any data at all. This can be used to easily crash applications reading untrusted ASN.1 data, but does not seem exploitable for code execution. - CVE-2015-5727 The BER decoder would allocate a fairly arbitrary amount of memory in a length field, even if there was no chance the read request would succeed. This might cause the process to run out of memory or invoke the OOM killer. - CVE-2015-7827 Use constant time PKCS #1 unpadding to avoid possible side channel attack against RSA decryption - CVE-2016-2194 Infinite loop in modular square root algorithm. The ressol function implementing the Tonelli-Shanks algorithm for finding square roots could be sent into a nearly infinite loop due to a misplaced conditional check. This could occur if a composite modulus is provided, as this algorithm is only defined for primes. This function is exposed to attacker controlled input via the OS2ECP function during ECC point decompression. - CVE-2016-2195 Fix Heap overflow on invalid ECC point. - CVE-2016-2849 Use constant time modular inverse algorithm to avoid possible side channel attack against ECDSA.
    last seen 2017-10-29
    modified 2017-08-14
    plugin id 90841
    published 2016-05-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=90841
    title Debian DSA-3565-1 : botan1.10 - security update
refmap via4
confirm http://botan.randombit.net/security.html
debian DSA-3565
Last major update 13-05-2016 - 15:12
Published 13-05-2016 - 10:59
Back to Top