HIGH · 7.5

CVE-2014-3468

The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds acc...

Vulnerability Description

The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.

CVSS Score

7.5

HIGH

AV:N/AC:L/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
GnuGnutls< 3.5.7
GnuLibtasn1< 3.6
RedhatVirtualization6.0
DebianDebian Linux7.0
RedhatEnterprise Linux Desktop5.0
RedhatEnterprise Linux Eus6.5
RedhatEnterprise Linux Server5.0
RedhatEnterprise Linux Server Aus6.5
RedhatEnterprise Linux Server Tus6.5
RedhatEnterprise Linux Workstation5.0
SuseLinux Enterprise Desktop11
SuseLinux Enterprise High Availability Extension11
SuseLinux Enterprise Server11
SuseLinux Enterprise Software Development Kit11
F5Arx Firmware>= 6.0.0, <= 6.4.0
F5Arx-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-3468?

CVE-2014-3468 is a vulnerability with a CVSS score of 7.5 (HIGH). The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds acc...

How severe is CVE-2014-3468?

CVE-2014-3468 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-3468?

Check the references section above for vendor advisories and patch information. Affected products include: Gnu Gnutls, Gnu Libtasn1, Redhat Virtualization, Debian Debian Linux, Redhat Enterprise Linux Desktop.