Cameron Hamilton-Rich axTLS through 2.1.5 Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) Vulnerability
The asn1_signature function in asn1.c in Cameron Hamilton-Rich axTLS through 2.1.5 has a Buffer Overflow.
The information has been provided by Deutsche
The original article can be found at:https://seclists.org/bugtraq/2019/Nov/44
Allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted certificate in the TLS certificate handshake message, because the result of get_asn1_length() is not checked for a minimum or maximum size.
Cameron Hamilton-Rich axTLS through 2.1.5