First published: Mon Oct 24 2022(Updated: )
GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Libtasn1 | <4.19.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Debian Debian Linux | =10.0 | |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-46848 is a vulnerability in GNU Libtasn1 before version 4.19.0, which could allow a remote attacker to obtain sensitive information or cause a denial of service.
An attacker can exploit CVE-2021-46848 by sending a specially-crafted request to the affected system.
CVE-2021-46848 has a severity rating of 9.1 (critical).
GNU Libtasn1 versions up to and excluding 4.19.0 are affected, as well as Fedora 35, 36, and 37, Debian Debian Linux 10.0, and IBM Security Verify Access Docker and IBM Security Verify Access up to version 10.0.X.
To mitigate CVE-2021-46848, it is recommended to update to GNU Libtasn1 version 4.19.0 and apply any necessary patches provided by your software vendor.