First published: Mon May 04 2015(Updated: )
A heap-based buffer overflow flaw was found in the way the libtasn1 library decoded certain DER-encoded input. A specially crafted, DER-encoded input could cause an application using libtasn1 to perform an invalid read, causing the application to crash. Upstream patch: <a href="http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commitdiff;h=f979435823a02f842c41d49cd41cc81f25b5d677">http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commitdiff;h=f979435823a02f842c41d49cd41cc81f25b5d677</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libtasn1 | <4.5 | 4.5 |
openSUSE | =13.2 | |
Fedoraproject Fedora | =21 | |
GNU Libtasn1 | <=4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3622 is classified as a high severity vulnerability due to the potential for a heap-based buffer overflow that can lead to application crashes.
To fix CVE-2015-3622, update the libtasn1 library to version 4.5 or later.
CVE-2015-3622 affects libtasn1 versions up to 4.4, as well as specific versions of openSUSE and Fedora.
The flaw in CVE-2015-3622 is a heap-based buffer overflow that occurs when decoding certain DER-encoded input.
Yes, CVE-2015-3622 can lead to security risks by crashing applications and potentially allowing for exploitation in a malicious environment.