635
VMScore

CVE-2018-1000654

Published: 20/08/2018 Updated: 07/11/2023
CVSS v2 Base Score: 7.1 | Impact Score: 6.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 635
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu libtasn1 4.12

gnu libtasn1 4.13

Vendor Advisories

Debian Bug report logs - #906768 libtasn-1: CVE-2018-1000654 Package: src:libtasn1-6; Maintainer for src:libtasn1-6 is Debian GnuTLS Maintainers <pkg-gnutls-maint@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 20 Aug 2018 20:21:02 UTC Severity: important Tags: security, ups ...
GNU Libtasn1-413 libtasn1-413 version libtasn1-413, libtasn1-412 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed This attack appears to be exploitable via parsing a crafted file ...