MEDIUM · 4.3

CVE-2015-3622

The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.

Vulnerability Description

The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.

CVSS Score

4.3

MEDIUM

AV:N/AC:M/Au:N/C:N/I:N/A:P
Confidentiality
NONE
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
OpensuseOpensuse13.2
FedoraprojectFedora21
GnuLibtasn1<= 4.4

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-3622?

CVE-2015-3622 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.

How severe is CVE-2015-3622?

CVE-2015-3622 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-3622?

Check the references section above for vendor advisories and patch information. Affected products include: Opensuse Opensuse, Fedoraproject Fedora, Gnu Libtasn1.