Executive Summary
Summary | |
---|---|
Title | libtasn vulnerability |
Informations | |||
---|---|---|---|
Name | USN-251-1 | First vendor Publication | 2006-02-16 |
Vendor | Ubuntu | Last vendor Modification | 2006-02-16 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) Ubuntu 5.04 (Hoary Hedgehog) Ubuntu 5.10 (Breezy Badger) The following packages are affected: libtasn1-2 libgnutls10 libgnutls11 The problem can be corrected by upgrading the affected package to the following versions: Ubuntu 4.10: Ubuntu 5.04: Ubuntu 5.10: It is highly recommended to restart your computer after a standard system upgrade to effect the necessary changes. If you cannot afford to do that then you need to restart all server processes which use TLS or SSL. Details follow: Evgeny Legerov discovered a buffer overflow in the DER format decoding function of the libtasn library. This library is mainly used by the GNU TLS library; by sending a specially crafted X.509 certificate to a server which uses TLS encryption/authentication, a remote attacker could exploit this to crash that server process and possibly even execute arbitrary code with the privileges of that server. In order to fix the vulnerability in libtasn, several internal function signatures had to be changed; some of these functions are used by the GNU TLS library, so that library needs to be updated as well. |
Original Source
Url : http://www.ubuntu.com/usn/USN-251-1 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10540 | |||
Oval ID: | oval:org.mitre.oval:def:10540 | ||
Title: | Tiny ASN.1 Library (libtasn1) before 0.2.18, as used by (1) GnuTLS 1.2.x before 1.2.10 and 1.3.x before 1.3.4, and (2) GNU Shishi, allows attackers to crash the DER decoder and possibly execute arbitrary code via "out-of-bounds access" caused by invalid input, as demonstrated by the ProtoVer SSL test suite. | ||
Description: | Tiny ASN.1 Library (libtasn1) before 0.2.18, as used by (1) GnuTLS 1.2.x before 1.2.10 and 1.3.x before 1.3.4, and (2) GNU Shishi, allows attackers to crash the DER decoder and possibly execute arbitrary code via "out-of-bounds access" caused by invalid input, as demonstrated by the ProtoVer SSL test suite. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-0645 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-10-10 | Name : SLES9: Security update for gnutls File : nvt/sles9p5016462.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200602-08 (libtasn1) File : nvt/glsa_200602_08.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 985-1 (libtasn1-2) File : nvt/deb_985_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 986-1 (gnutls11) File : nvt/deb_986_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
23054 | GnuTLS libtasn1 DER Decoding Overflow DoS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-985.nasl - Type : ACT_GATHER_INFO |
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-986.nasl - Type : ACT_GATHER_INFO |
2006-07-05 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2006-0207.nasl - Type : ACT_GATHER_INFO |
2006-03-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-251-1.nasl - Type : ACT_GATHER_INFO |
2006-02-17 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200602-08.nasl - Type : ACT_GATHER_INFO |
2006-02-14 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-039.nasl - Type : ACT_GATHER_INFO |
2006-02-11 | Name : The remote Fedora Core host is missing a security update. File : fedora_2006-107.nasl - Type : ACT_GATHER_INFO |
2006-02-11 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2006-0207.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:03:18 |
|