445
VMScore

CVE-2017-10790

Published: 02/07/2017 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The _asn1_check_identifier function in GNU Libtasn1 up to and including 4.12 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure. It may lead to a remote denial of service attack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu libtasn1

Vendor Advisories

Debian Bug report logs - #867398 libtasn1-6: CVE-2017-10790 Package: src:libtasn1-6; Maintainer for src:libtasn1-6 is Debian GnuTLS Maintainers <pkg-gnutls-maint@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 6 Jul 2017 12:54:02 UTC Severity: normal Tags: patch, security, ...
Several security issues were fixed in Libtasn1 ...
The _asn1_check_identifier function in GNU Libtasn1 through 412 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure It may lead to a remote denial of service attack ...

Github Repositories

Checks a given docker image against alpine-secdb

Alpine scan A simple tool to compare a given docker image against the alpine-secdb which is Alpine's official source of security updates Dependencies ruby bundler git (used to clone alpine-secdb) an internet connection (used to clone alpine-secdb) Usage $ bundle install $ docker pull library/alpine:latest latest: Pulling from library/alpine b56ae66c2937: Pulling fs lay