7.5
CVSSv3

CVE-2019-10013

Published: 03/12/2019 Updated: 31/12/2019
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The asn1_signature function in asn1.c in Cameron Hamilton-Rich axTLS up to and including 2.1.5 has a Buffer Overflow that allows remote malicious users to cause a denial of service (memory and CPU consumption) via a crafted certificate in the TLS certificate handshake message, because the result of get_asn1_length() is not checked for a minimum or maximum size.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

axtls project axtls

Vendor Advisories

Debian Bug report logs - #953326 axtls: CVE-2019-9689 CVE-2019-10013 Package: src:axtls; Maintainer for src:axtls is Yangfl <mmyangfl@gmailcom>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 7 Mar 2020 20:12:02 UTC Severity: grave Tags: security, upstream Found in version axtls/215+ds-1 R ...