First published: Mon Jun 13 2016(Updated: )
Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the "returned length of the object from _ksba_ber_parse_tl."
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
GnuPG Libksba | <=1.3.3 | |
openSUSE | =42.1 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.10 | |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4579 has been classified as a high severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2016-4579, upgrade libksba to version 1.3.4 or later.
CVE-2016-4579 affects libksba versions before 1.3.4, as well as specific versions of Ubuntu and openSUSE.
CVE-2016-4579 can be exploited by remote attackers to trigger an out-of-bounds read leading to a crash.
There is no documented workaround for CVE-2016-4579; upgrading to a secure version is the recommended approach.