First published: Mon Jan 22 2018(Updated: )
An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Libtasn1 | <=4.12 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =26 | |
Fedoraproject Fedora | =27 | |
ubuntu/libtasn1-6 | <4.12-2.1ubuntu0.1 | 4.12-2.1ubuntu0.1 |
ubuntu/libtasn1-6 | <4.13-2 | 4.13-2 |
ubuntu/libtasn1-6 | <4.7-3ubuntu0.16.04.3 | 4.7-3ubuntu0.16.04.3 |
debian/libtasn1-6 | 4.16.0-2+deb11u1 4.19.0-2 4.19.0-3 |
http://git.savannah.nongnu.org/cgit/libtasn1.git/commit/?id=c593ae84cfcde8fea45787e53950e0ac71e9ca97
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6003 is a vulnerability in GNU Libtasn1 before 4.13 that allows unlimited recursion in the BER decoder, leading to stack exhaustion and DoS.
Users of GNU Libtasn1 versions before 4.13 are affected by CVE-2018-6003, which can result in a Denial of Service (DoS) condition.
The severity of CVE-2018-6003 is rated as high with a CVSS score of 7.5.
To fix CVE-2018-6003, users should update to GNU Libtasn1 version 4.13 or later.
For more information about CVE-2018-6003, you can refer to the following references: [link1], [link2], [link3].