Cameron Hamilton-Rich axTLS through 2.1.5 Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) Vulnerability

Summary

Cameron Hamilton-Rich axTLS through 2.1.5 suffers from buffer copy without checking size of input (‘Classic Buffer Overflow’) vulnerability.

Credit:

The information has been provided by Vendor

The original article can be found at:https://seclists.org/bugtraq/2019/Nov/44


Details

The asn1_signature function in asn1.c in Cameron Hamilton-Rich axTLS through 2.1.5 has a Buffer Overflow that allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted certificate in the TLS certificate handshake message, because the result of get_asn1_length() is not checked for a minimum or maximum size.

 

Vulnerable Systems:

Cameron Hamilton-Rich axTLS through 2.1.5

 

CVE Information:

CVE-2019-10013

 

Disclosure Timeline:
Published Date:12/3/2019

Categories: News