### [CVE-2018-1000654](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file. ### POC #### Reference - https://gitlab.com/gnutls/libtasn1/issues/4 #### Github - https://github.com/PajakAlexandre/wik-dps-tp02 - https://github.com/brandoncamenisch/release-the-code-litecoin - https://github.com/dispera/giant-squid - https://github.com/domyrtille/interview_project - https://github.com/epequeno/devops-demo - https://github.com/garethr/snykout - https://github.com/nedenwalker/spring-boot-app-using-gradle - https://github.com/nedenwalker/spring-boot-app-with-log4j-vuln - https://github.com/onzack/trivy-multiscanner - https://github.com/yeforriak/snyk-to-cve