The asn1_signature function in asn1.c in Cameron Hamilton-Rich axTLS through 2.1.5 has a Buffer Overflow that allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted certificate in the TLS certificate handshake message, because the result of get_asn1_length() is not checked for a minimum or maximum size.
References
Configurations
Information
Published : 2019-12-03 12:15
Updated : 2019-12-31 12:15
NVD link : CVE-2019-10013
Mitre link : CVE-2019-10013
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
axtls_project
- axtls