{ "CVE_data_meta" : { "ASSIGNER" : "PSIRT-CNA@flexerasoftware.com", "ID" : "CVE-2017-6891", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "GnuTLS libtasn1", "version" : { "version_data" : [ { "version_value" : "4.10. Other versions may also be affected." } ] } } ] }, "vendor_name" : "Flexera Software LLC" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "Two errors in the \"asn1_find_node()\" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "Stack-based buffer overflow leading to system compromise" } ] } ] }, "references" : { "reference_data" : [ { "name" : "https://secuniaresearch.flexerasoftware.com/advisories/76125/", "refsource" : "MISC", "url" : "https://secuniaresearch.flexerasoftware.com/advisories/76125/" }, { "name" : "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-11/", "refsource" : "MISC", "url" : "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-11/" }, { "name" : "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=5520704d075802df25ce4ffccc010ba1641bd484", "refsource" : "CONFIRM", "url" : "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=5520704d075802df25ce4ffccc010ba1641bd484" }, { "name" : "DSA-3861", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2017/dsa-3861" }, { "name" : "GLSA-201710-11", "refsource" : "GENTOO", "url" : "https://security.gentoo.org/glsa/201710-11" }, { "name" : "98641", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/98641" }, { "name" : "1038619", "refsource" : "SECTRACK", "url" : "http://www.securitytracker.com/id/1038619" } ] } }