GNU Libtasn1 is vulnerable to denial of service attacks. A remote unauthenticated attacker could exploit the vulnerable _asn1_extract_der_octet
function to cause an out-of-bounds heap read via a crafted certificate leading to a system crash.
lists.fedoraproject.org/pipermail/package-announce/2015-May/158225.html
lists.fedoraproject.org/pipermail/package-announce/2015-May/158225.html
lists.opensuse.org/opensuse-updates/2015-08/msg00014.html
lists.opensuse.org/opensuse-updates/2015-08/msg00014.html
lists.opensuse.org/opensuse-updates/2016-06/msg00047.html
lists.opensuse.org/opensuse-updates/2016-06/msg00047.html
lists.opensuse.org/opensuse-updates/2016-06/msg00097.html
lists.opensuse.org/opensuse-updates/2016-06/msg00097.html
packetstormsecurity.com/files/131711/libtasn1-Heap-Overflow.html
packetstormsecurity.com/files/131711/libtasn1-Heap-Overflow.html
seclists.org/fulldisclosure/2015/Apr/109
seclists.org/fulldisclosure/2015/Apr/109
www.debian.org/security/2015/dsa-3256
www.debian.org/security/2015/dsa-3256
www.mandriva.com/security/advisories?name=MDVSA-2015:232
www.mandriva.com/security/advisories?name=MDVSA-2015:232
www.securityfocus.com/bid/74419
www.securityfocus.com/bid/74419
www.securitytracker.com/id/1032246
www.securitytracker.com/id/1032246
www.ubuntu.com/usn/USN-2604-1
www.ubuntu.com/usn/USN-2604-1
access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.4_Release_Notes/index.html
access.redhat.com/errata/RHSA-2017:1860
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1360639
lists.gnu.org/archive/html/help-libtasn1/2015-04/msg00000.html
lists.gnu.org/archive/html/help-libtasn1/2015-04/msg00000.html
security.gentoo.org/glsa/201509-04
security.gentoo.org/glsa/201509-04