{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2008-1673", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic modules; and (b) the gxsnmp package; does not properly validate length values during decoding of ASN.1 BER data, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a length greater than the working buffer, which can lead to an unspecified overflow; (2) an oid length of zero, which can lead to an off-by-one error; or (3) an indefinite length for a primitive encoding." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20080611 rPSA-2008-0189-1 kernel xen", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/archive/1/493300/100/0/threaded" }, { "name" : "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=33afb8403f361919aa5c8fe1d0a4f5ddbfbbea3c", "refsource" : "CONFIRM", "url" : "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=33afb8403f361919aa5c8fe1d0a4f5ddbfbbea3c" }, { "name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ddb2c43594f22843e9f3153da151deaba1a834c5", "refsource" : "CONFIRM", "url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ddb2c43594f22843e9f3153da151deaba1a834c5" }, { "name" : "http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.6", "refsource" : "CONFIRM", "url" : "http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.6" }, { "name" : "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.5", "refsource" : "CONFIRM", "url" : "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.5" }, { "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=443962", "refsource" : "CONFIRM", "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=443962" }, { "name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0189", "refsource" : "CONFIRM", "url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0189" }, { "name" : "DSA-1592", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2008/dsa-1592" }, { "name" : "FEDORA-2008-5308", "refsource" : "FEDORA", "url" : "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00587.html" }, { "name" : "MDVSA-2008:113", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:113" }, { "name" : "MDVSA-2008:174", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:174" }, { "name" : "SUSE-SA:2008:035", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html" }, { "name" : "SUSE-SA:2008:038", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html" }, { "name" : "SUSE-SA:2008:048", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html" }, { "name" : "SUSE-SR:2008:025", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" }, { "name" : "SUSE-SA:2008:047", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html" }, { "name" : "SUSE-SA:2008:049", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html" }, { "name" : "SUSE-SA:2008:052", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html" }, { "name" : "USN-625-1", "refsource" : "UBUNTU", "url" : "http://www.ubuntu.com/usn/usn-625-1" }, { "name" : "29589", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/29589" }, { "name" : "32370", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/32370" }, { "name" : "30982", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/30982" }, { "name" : "ADV-2008-1770", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2008/1770" }, { "name" : "1020210", "refsource" : "SECTRACK", "url" : "http://www.securitytracker.com/id?1020210" }, { "name" : "30580", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/30580" }, { "name" : "30000", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/30000" }, { "name" : "30644", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/30644" }, { "name" : "30658", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/30658" }, { "name" : "31107", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/31107" }, { "name" : "31836", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/31836" }, { "name" : "32759", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/32759" }, { "name" : "32103", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/32103" }, { "name" : "32104", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/32104" }, { "name" : "linux-kernel-ber-decoder-bo(42921)", "refsource" : "XF", "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42921" } ] } }