First published: Fri Feb 10 2006(Updated: )
Tiny ASN.1 Library (libtasn1) before 0.2.18, as used by (1) GnuTLS 1.2.x before 1.2.10 and 1.3.x before 1.3.4, and (2) GNU Shishi, allows attackers to crash the DER decoder and possibly execute arbitrary code via "out-of-bounds access" caused by invalid input, as demonstrated by the ProtoVer SSL test suite.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
libtasn1 (GNU) | =0.1.0 | |
libtasn1 (GNU) | =0.1.1 | |
libtasn1 (GNU) | =0.1.2 | |
libtasn1 (GNU) | =0.2.0 | |
libtasn1 (GNU) | =0.2.1 | |
libtasn1 (GNU) | =0.2.2 | |
libtasn1 (GNU) | =0.2.3 | |
libtasn1 (GNU) | =0.2.4 | |
libtasn1 (GNU) | =0.2.5 | |
libtasn1 (GNU) | =0.2.6 | |
libtasn1 (GNU) | =0.2.7 | |
libtasn1 (GNU) | =0.2.8 | |
libtasn1 (GNU) | =0.2.9 | |
libtasn1 (GNU) | =0.2.10 | |
libtasn1 (GNU) | =0.2.11 | |
libtasn1 (GNU) | =0.2.12 | |
libtasn1 (GNU) | =0.2.13 | |
libtasn1 (GNU) | =0.2.14 | |
libtasn1 (GNU) | =0.2.15 | |
libtasn1 (GNU) | =0.2.16 | |
libtasn1 (GNU) | =0.2.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0645 has been classified as a high severity vulnerability due to its potential to crash systems and execute arbitrary code.
To mitigate CVE-2006-0645, upgrade the Tiny ASN.1 Library (libtasn1) to version 0.2.18 or later.
CVE-2006-0645 affects versions of the Tiny ASN.1 Library (libtasn1) prior to 0.2.18, as well as GnuTLS 1.2.x before 1.2.10 and 1.3.x before 1.3.4.
CVE-2006-0645 can be exploited through invalid input that leads to out-of-bounds access, potentially causing application crashes.
CVE-2006-0645 was disclosed in February 2006, highlighting vulnerabilities in several versions of libtasn1 and GnuTLS.