First published: Wed May 28 2014(Updated: )
It was discovered that libtasn1 library function asn1_get_bit_der() could incorrectly report negative bit length of the value read from ASN.1 input. This could possibly lead to an out of bounds access in an application using libtasn1, for example in case if application tried to terminate read value with NUL byte. The following upstream commit corrects the issue and causes the function to report error rather than return negative length value: <a href="http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=1c3ccb3e040bf13e342ee60bc23b21b97b11923f">http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=1c3ccb3e040bf13e342ee60bc23b21b97b11923f</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libtasn1 | <3.6 | 3.6 |
Debian GnuTLS | <3.5.7 | |
libtasn1 | <3.6 | |
Red Hat Enterprise Virtualization | =6.0 | |
Debian | =7.0 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =6.5 | |
redhat enterprise Linux eus | =7.3 | |
redhat enterprise Linux eus | =7.4 | |
redhat enterprise Linux eus | =7.5 | |
redhat enterprise Linux eus | =7.6 | |
redhat enterprise Linux eus | =7.7 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =6.5 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server tus | =6.5 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux server tus | =7.7 | |
redhat enterprise Linux workstation | =5.0 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp3 | |
SUSE Linux Enterprise High Availability | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp3 | |
suse linux enterprise server vmware | =11-sp3 | |
SUSE Linux Enterprise Software Development Kit | =11-sp3 | |
F5 ARX Firmware | >=6.0.0<=6.4.0 | |
F5 ARX Data Manager |
http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=1c3ccb3e040bf13e342ee60bc23b21b97b11923f
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3468 is classified as a moderate severity vulnerability.
To address CVE-2014-3468, upgrade the affected libtasn1 library to version 3.6 or later.
CVE-2014-3468 affects multiple versions of the libtasn1 library and software using it, including GNU GnuTLS and Red Hat Enterprise Linux products.
Yes, CVE-2014-3468 has the potential to cause out of bounds access, which could lead to data leaks or crashes in an application utilizing libtasn1.
There are no known workarounds for CVE-2014-3468; updating the affected software is the recommended action.