ID CVE-2017-6891
Summary Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.
References
Vulnerable Configurations
  • cpe:2.3:a:gnu:libtasn1:4.10:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:libtasn1:4.10:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:bookkeeper:4.12.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:bookkeeper:4.12.1:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 03-02-2023 - 19:05)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
refmap via4
bid 98641
confirm http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=5520704d075802df25ce4ffccc010ba1641bd484
debian DSA-3861
gentoo GLSA-201710-11
misc
sectrack 1038619
suse openSUSE-SU-2019:1510
Last major update 03-02-2023 - 19:05
Published 22-05-2017 - 19:29
Last modified 03-02-2023 - 19:05
Back to Top