Source: axtls
Version: 2.1.5+ds-1
Severity: grave
Tags: security upstream

Hi,

The following vulnerabilities were published for axtls.

CVE-2019-9689[0]:
| process_certificate in tls1.c in Cameron Hamilton-Rich axTLS through
| 2.1.5 has a Buffer Overflow via a crafted TLS certificate handshake
| message with zero certificates.


CVE-2019-10013[1]:
| The asn1_signature function in asn1.c in Cameron Hamilton-Rich axTLS
| through 2.1.5 has a Buffer Overflow that allows remote attackers to
| cause a denial of service (memory and CPU consumption) via a crafted
| certificate in the TLS certificate handshake message, because the
| result of get_asn1_length() is not checked for a minimum or maximum
| size.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-9689
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9689
[1] https://security-tracker.debian.org/tracker/CVE-2019-10013
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10013
[2] https://seclists.org/bugtraq/2019/Nov/44

Regards,
Salvatore

Reply via email to