First published: Thu May 05 2016(Updated: )
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Ubuntu | =16.04 | |
openSUSE | =13.2 | |
Libtasn1 | <=4.7 | |
Red Hat Fedora | =22 | |
Red Hat Fedora | =23 | |
Red Hat Fedora | =24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4008 is categorized as a denial of service vulnerability.
To fix CVE-2016-4008, update the libtasn1 library to version 4.8 or later and ensure the ASN1_DECODE_FLAG_STRICT_DER flag is used.
CVE-2016-4008 affects various versions of GNU Libtasn1 prior to 4.8 and multiple versions of Ubuntu, Fedora, and openSUSE.
CVE-2016-4008 allows remote attackers to cause a denial of service through infinite recursion when processing crafted certificates.
Yes, patches for CVE-2016-4008 are available in the updated versions of the affected software.