First published: Mon Aug 20 2018(Updated: )
GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libtasn1 | =4.12 | |
Libtasn1 | =4.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000654 is classified as a medium severity vulnerability due to its potential to cause denial of service.
To fix CVE-2018-1000654, upgrade to GNU Libtasn1 version 4.14 or later.
CVE-2018-1000654 exploits an issue in _asn1_expand_object_id(p_tree), leading to increased CPU usage.
CVE-2018-1000654 affects GNU Libtasn1 versions 4.12 and 4.13.
CVE-2018-1000654 is associated with a denial of service (DoS) attack.