7.5
CVSSv3

CVE-2017-10790

Published: 02/07/2017 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The _asn1_check_identifier function in GNU Libtasn1 up to and including 4.12 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure. It may lead to a remote denial of service attack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu libtasn1

Vendor Advisories

Several security issues were fixed in Libtasn1 ...
Debian Bug report logs - #867398 libtasn1-6: CVE-2017-10790 Package: src:libtasn1-6; Maintainer for src:libtasn1-6 is Debian GnuTLS Maintainers <pkg-gnutls-maint@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 6 Jul 2017 12:54:02 UTC Severity: normal Tags: patch, security, ...
The _asn1_check_identifier function in GNU Libtasn1 through 412 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure It may lead to a remote denial of service attack ...

Github Repositories

Checks a given docker image against alpine-secdb

Alpine scan A simple tool to compare a given docker image against the alpine-secdb which is Alpine's official source of security updates Dependencies ruby bundler git (used to clone alpine-secdb) an internet connection (used to clone alpine-secdb) Usage $ bundle install $ docker pull library/alpine:latest latest: Pulling from library/alpine b56ae66c2937: Pulling fs lay