{ "schema_version": "1.4.0", "id": "GHSA-872v-39hw-4fr3", "modified": "2022-05-24T17:02:32Z", "published": "2022-05-24T17:02:32Z", "aliases": [ "CVE-2019-10013" ], "details": "The asn1_signature function in asn1.c in Cameron Hamilton-Rich axTLS through 2.1.5 has a Buffer Overflow that allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted certificate in the TLS certificate handshake message, because the result of get_asn1_length() is not checked for a minimum or maximum size.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10013" }, { "type": "WEB", "url": "https://seclists.org/bugtraq/2019/Nov/44" }, { "type": "WEB", "url": "https://www.telekom.com/en/corporate-responsibility/data-protection-data-security/security/details/advisories-504842" }, { "type": "WEB", "url": "https://www.telekom.com/resource/blob/586416/12097aeb8f9a6bba89a804b94575521a/dl-191121-critical-remote-denial-of-service-vulnerability-i--data.pdf" }, { "type": "WEB", "url": "http://axtls.sourceforge.net" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/155500/axTLS-2.1.5-Denial-Of-Service.html" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-12-03T20:15:00Z" } }