CWE
189
Advisory Published
CVE Published
Updated

CVE-2012-1569

First published: Tue Mar 20 2012(Updated: )

libtasn1 version 2.12 was released fixing the following issue: - Corrected DER decoding issue (reported by Matthew Hall). Added self check to detect the problem, see tests/Test_overflow.c. This problem can lead to at least remotely triggered crashes, see further analysis on the libtasn1 mailing list. <a href="http://thread.gmane.org/gmane.comp.gnu.libtasn1.general/53">http://thread.gmane.org/gmane.comp.gnu.libtasn1.general/53</a> Upstream and few limited details are available at: <a href="http://thread.gmane.org/gmane.comp.gnu.libtasn1.general/54">http://thread.gmane.org/gmane.comp.gnu.libtasn1.general/54</a> The behavior of asn1_get_length_der was changed to protect against accidental incorrect use, if though it was previously "working properly and as documented".

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
GnuTLS<=3.0.15
GnuTLS=1.0.16
GnuTLS=1.0.17
GnuTLS=1.0.18
GnuTLS=1.0.19
GnuTLS=1.0.20
GnuTLS=1.0.21
GnuTLS=1.0.22
GnuTLS=1.0.23
GnuTLS=1.0.24
GnuTLS=1.0.25
GnuTLS=1.1.13
GnuTLS=1.1.14
GnuTLS=1.1.15
GnuTLS=1.1.16
GnuTLS=1.1.17
GnuTLS=1.1.18
GnuTLS=1.1.19
GnuTLS=1.1.20
GnuTLS=1.1.21
GnuTLS=1.1.22
GnuTLS=1.1.23
GnuTLS=1.2.0
GnuTLS=1.2.1
GnuTLS=1.2.2
GnuTLS=1.2.3
GnuTLS=1.2.4
GnuTLS=1.2.5
GnuTLS=1.2.6
GnuTLS=1.2.7
GnuTLS=1.2.8
GnuTLS=1.2.8.1a1
GnuTLS=1.2.9
GnuTLS=1.2.10
GnuTLS=1.2.11
GnuTLS=1.3.0
GnuTLS=1.3.1
GnuTLS=1.3.2
GnuTLS=1.3.3
GnuTLS=1.3.4
GnuTLS=1.3.5
GnuTLS=1.4.0
GnuTLS=1.4.1
GnuTLS=1.4.2
GnuTLS=1.4.3
GnuTLS=1.4.4
GnuTLS=1.4.5
GnuTLS=1.5.0
GnuTLS=1.5.1
GnuTLS=1.5.2
GnuTLS=1.5.3
GnuTLS=1.5.4
GnuTLS=1.5.5
GnuTLS=1.6.0
GnuTLS=1.6.1
GnuTLS=1.6.2
GnuTLS=1.6.3
GnuTLS=1.7.0
GnuTLS=1.7.1
GnuTLS=1.7.2
GnuTLS=1.7.3
GnuTLS=1.7.4
GnuTLS=1.7.5
GnuTLS=1.7.6
GnuTLS=1.7.7
GnuTLS=1.7.8
GnuTLS=1.7.9
GnuTLS=1.7.10
GnuTLS=1.7.11
GnuTLS=1.7.12
GnuTLS=1.7.13
GnuTLS=1.7.14
GnuTLS=1.7.15
GnuTLS=1.7.16
GnuTLS=1.7.17
GnuTLS=1.7.18
GnuTLS=1.7.19
GnuTLS=2.0.0
GnuTLS=2.0.1
GnuTLS=2.0.2
GnuTLS=2.0.3
GnuTLS=2.0.4
GnuTLS=2.1.0
GnuTLS=2.1.1
GnuTLS=2.1.2
GnuTLS=2.1.3
GnuTLS=2.1.4
GnuTLS=2.1.5
GnuTLS=2.1.6
GnuTLS=2.1.7
GnuTLS=2.1.8
GnuTLS=2.2.0
GnuTLS=2.2.1
GnuTLS=2.2.2
GnuTLS=2.2.3
GnuTLS=2.2.4
GnuTLS=2.2.5
GnuTLS=2.3.0
GnuTLS=2.3.1
GnuTLS=2.3.2
GnuTLS=2.3.3
GnuTLS=2.3.4
GnuTLS=2.3.5
GnuTLS=2.3.6
GnuTLS=2.3.7
GnuTLS=2.3.8
GnuTLS=2.3.9
GnuTLS=2.3.10
GnuTLS=2.3.11
GnuTLS=2.4.0
GnuTLS=2.4.1
GnuTLS=2.4.2
GnuTLS=2.4.3
GnuTLS=2.5.0
GnuTLS=2.6.0
GnuTLS=2.6.1
GnuTLS=2.6.2
GnuTLS=2.6.3
GnuTLS=2.6.4
GnuTLS=2.6.5
GnuTLS=2.6.6
GnuTLS=2.7.4
GnuTLS=2.8.0
GnuTLS=2.8.1
GnuTLS=2.8.2
GnuTLS=2.8.3
GnuTLS=2.8.4
GnuTLS=2.8.5
GnuTLS=2.8.6
GnuTLS=2.10.0
GnuTLS=2.10.1
GnuTLS=2.10.2
GnuTLS=2.10.3
GnuTLS=2.10.4
GnuTLS=2.10.5
GnuTLS=2.12.0
GnuTLS=2.12.1
GnuTLS=2.12.2
GnuTLS=2.12.3
GnuTLS=2.12.4
GnuTLS=2.12.5
GnuTLS=2.12.6
GnuTLS=2.12.6.1
GnuTLS=2.12.7
GnuTLS=2.12.8
GnuTLS=2.12.9
GnuTLS=2.12.10
GnuTLS=2.12.11
GnuTLS=2.12.12
GnuTLS=2.12.13
GnuTLS=2.12.14
GnuTLS=3.0
GnuTLS=3.0.0
GnuTLS=3.0.1
GnuTLS=3.0.2
GnuTLS=3.0.3
GnuTLS=3.0.4
GnuTLS=3.0.5
GnuTLS=3.0.6
GnuTLS=3.0.7
GnuTLS=3.0.8
GnuTLS=3.0.9
GnuTLS=3.0.10
GnuTLS=3.0.11
GnuTLS=3.0.12
GnuTLS=3.0.13
GnuTLS=3.0.14
Libtasn1<=2.11
Libtasn1=0.1.0
Libtasn1=0.1.1
Libtasn1=0.1.2
Libtasn1=0.2.0
Libtasn1=0.2.1
Libtasn1=0.2.2
Libtasn1=0.2.3
Libtasn1=0.2.4
Libtasn1=0.2.5
Libtasn1=0.2.6
Libtasn1=0.2.7
Libtasn1=0.2.8
Libtasn1=0.2.9
Libtasn1=0.2.10
Libtasn1=0.2.11
Libtasn1=0.2.12
Libtasn1=0.2.13
Libtasn1=0.2.14
Libtasn1=0.2.15
Libtasn1=0.2.16
Libtasn1=0.2.17
Libtasn1=0.2.18
Libtasn1=0.3.0
Libtasn1=0.3.1
Libtasn1=0.3.2
Libtasn1=0.3.3
Libtasn1=0.3.4
Libtasn1=0.3.5
Libtasn1=0.3.6
Libtasn1=0.3.7
Libtasn1=0.3.8
Libtasn1=0.3.9
Libtasn1=0.3.10
Libtasn1=1.0
Libtasn1=1.1
Libtasn1=1.2
Libtasn1=1.3
Libtasn1=1.4
Libtasn1=1.5
Libtasn1=1.6
Libtasn1=1.7
Libtasn1=1.8
Libtasn1=2.0
Libtasn1=2.1
Libtasn1=2.2
Libtasn1=2.3
Libtasn1=2.4
Libtasn1=2.5
Libtasn1=2.6
Libtasn1=2.7
Libtasn1=2.8
Libtasn1=2.9
Libtasn1=2.10

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2012-1569?

    CVE-2012-1569 has been classified as having high severity due to potential remote crashes.

  • How do I fix CVE-2012-1569?

    To fix CVE-2012-1569, you should upgrade the affected GNU GnuTLS and libtasn1 versions to versions 2.12 or higher.

  • What impacts does CVE-2012-1569 have on system security?

    CVE-2012-1569 can lead to denial of service attacks as it may cause crashes during DER decoding.

  • Which versions of GNU GnuTLS are affected by CVE-2012-1569?

    CVE-2012-1569 affects multiple versions of GNU GnuTLS up to 3.0.15.

  • Is CVE-2012-1569 a local or remote vulnerability?

    CVE-2012-1569 is considered a remote vulnerability as it can be exploited from a remote location.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203