Vulnerability Description
The asn1_signature function in asn1.c in Cameron Hamilton-Rich axTLS through 2.1.5 has a Buffer Overflow that allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted certificate in the TLS certificate handshake message, because the result of get_asn1_length() is not checked for a minimum or maximum size.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Axtls Project | Axtls | <= 2.1.5 |
Related Weaknesses (CWE)
References
- http://axtls.sourceforge.netVendor Advisory
- http://packetstormsecurity.com/files/155500/axTLS-2.1.5-Denial-Of-Service.htmlThird Party AdvisoryVDB Entry
- https://seclists.org/bugtraq/2019/Nov/44
- https://www.telekom.com/en/corporate-responsibility/data-protection-data-securit
- https://www.telekom.com/resource/blob/586416/12097aeb8f9a6bba89a804b94575521a/dl
- http://axtls.sourceforge.netVendor Advisory
- http://packetstormsecurity.com/files/155500/axTLS-2.1.5-Denial-Of-Service.htmlThird Party AdvisoryVDB Entry
- https://seclists.org/bugtraq/2019/Nov/44
- https://www.telekom.com/en/corporate-responsibility/data-protection-data-securit
- https://www.telekom.com/resource/blob/586416/12097aeb8f9a6bba89a804b94575521a/dl
FAQ
What is CVE-2019-10013?
CVE-2019-10013 is a vulnerability with a CVSS score of 7.5 (HIGH). The asn1_signature function in asn1.c in Cameron Hamilton-Rich axTLS through 2.1.5 has a Buffer Overflow that allows remote attackers to cause a denial of service (memory and CPU consumption) via a cr...
How severe is CVE-2019-10013?
CVE-2019-10013 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-10013?
Check the references section above for vendor advisories and patch information. Affected products include: Axtls Project Axtls.