CVE-2014-3467

Summary

CVECVE-2014-3467
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2014-06-05 20:55:00 UTC
Updated2020-11-16 14:33:00 UTC
DescriptionMultiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.

Risk And Classification

Problem Types: NVD-CWE-noinfo

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Debian Debian Linux 7.0 All All All
Operating System Debian Debian Linux 7.0 All All All
Hardware F5 Arx - All All All
Hardware F5 Arx - All All All
Operating System F5 Arx Firmware All All All All
Application Gnu Gnutls All All All All
Application Gnu Gnutls All All All All
Application Gnu Libtasn1 All All All All
Application Gnu Libtasn1 All All All All
Operating System Redhat Enterprise Linux Desktop 5.0 All All All
Operating System Redhat Enterprise Linux Desktop 6.0 All All All
Operating System Redhat Enterprise Linux Desktop 7.0 All All All
Operating System Redhat Enterprise Linux Desktop 5.0 All All All
Operating System Redhat Enterprise Linux Desktop 6.0 All All All
Operating System Redhat Enterprise Linux Desktop 7.0 All All All
Operating System Redhat Enterprise Linux Eus 6.5 All All All
Operating System Redhat Enterprise Linux Eus 7.3 All All All
Operating System Redhat Enterprise Linux Eus 7.4 All All All
Operating System Redhat Enterprise Linux Eus 7.5 All All All
Operating System Redhat Enterprise Linux Eus 7.6 All All All
Operating System Redhat Enterprise Linux Eus 7.7 All All All
Operating System Redhat Enterprise Linux Eus 6.5 All All All
Operating System Redhat Enterprise Linux Eus 7.3 All All All
Operating System Redhat Enterprise Linux Eus 7.4 All All All
Operating System Redhat Enterprise Linux Eus 7.5 All All All
Operating System Redhat Enterprise Linux Eus 7.6 All All All
Operating System Redhat Enterprise Linux Eus 7.7 All All All
Operating System Redhat Enterprise Linux Server 5.0 All All All
Operating System Redhat Enterprise Linux Server 6.0 All All All
Operating System Redhat Enterprise Linux Server 7.0 All All All
Operating System Redhat Enterprise Linux Server 5.0 All All All
Operating System Redhat Enterprise Linux Server 6.0 All All All
Operating System Redhat Enterprise Linux Server 7.0 All All All
Operating System Redhat Enterprise Linux Server Aus 6.5 All All All
Operating System Redhat Enterprise Linux Server Aus 7.3 All All All
Operating System Redhat Enterprise Linux Server Aus 7.4 All All All
Operating System Redhat Enterprise Linux Server Aus 7.6 All All All
Operating System Redhat Enterprise Linux Server Aus 7.7 All All All
Operating System Redhat Enterprise Linux Server Aus 6.5 All All All
Operating System Redhat Enterprise Linux Server Aus 7.3 All All All
Operating System Redhat Enterprise Linux Server Aus 7.4 All All All
Operating System Redhat Enterprise Linux Server Aus 7.6 All All All
Operating System Redhat Enterprise Linux Server Aus 7.7 All All All
Operating System Redhat Enterprise Linux Server Tus 6.5 All All All
Operating System Redhat Enterprise Linux Server Tus 7.3 All All All
Operating System Redhat Enterprise Linux Server Tus 7.6 All All All
Operating System Redhat Enterprise Linux Server Tus 7.7 All All All
Operating System Redhat Enterprise Linux Server Tus 6.5 All All All
Operating System Redhat Enterprise Linux Server Tus 7.3 All All All
Operating System Redhat Enterprise Linux Server Tus 7.6 All All All
Operating System Redhat Enterprise Linux Server Tus 7.7 All All All
Operating System Redhat Enterprise Linux Workstation 5.0 All All All
Operating System Redhat Enterprise Linux Workstation 6.0 All All All
Operating System Redhat Enterprise Linux Workstation 7.0 All All All
Operating System Redhat Enterprise Linux Workstation 5.0 All All All
Operating System Redhat Enterprise Linux Workstation 6.0 All All All
Operating System Redhat Enterprise Linux Workstation 7.0 All All All
Application Redhat Virtualization 6.0 All All All
Application Redhat Virtualization 6.0 All All All
Operating System Suse Linux Enterprise Desktop 11 sp3 All All
Operating System Suse Linux Enterprise Desktop 11 sp3 All All
Operating System Suse Linux Enterprise High Availability Extension 11 sp3 All All
Operating System Suse Linux Enterprise High Availability Extension 11 sp3 All All
Operating System Suse Linux Enterprise Server 11 sp1 All All
Operating System Suse Linux Enterprise Server 11 sp2 All All
Operating System Suse Linux Enterprise Server 11 sp3 All All
Operating System Suse Linux Enterprise Server 11 sp3 All All
Operating System Suse Linux Enterprise Server 11 sp1 All All
Operating System Suse Linux Enterprise Server 11 sp2 All All
Operating System Suse Linux Enterprise Server 11 sp3 All All
Operating System Suse Linux Enterprise Server 11 sp3 All All
Operating System Suse Linux Enterprise Software Development Kit 11 sp3 All All
Operating System Suse Linux Enterprise Software Development Kit 11 sp3 All All

References

ReferenceSourceLinkTags
linux.oracle.com | ELSA-2014-0594 - gnutls security update CONFIRM linux.oracle.com Third Party Advisory
Security Advisory SA61888 - Debian update for libtasn1-3 - Secunia SECUNIA secunia.com Third Party Advisory
Security Advisory SA58614 - Red Hat update for libtasn1 - Secunia SECUNIA secunia.com Third Party Advisory
support.f5.com/kb/en-us/solutions/public/15000/400/sol15423.html CONFIRM support.f5.com Third Party Advisory
Debian -- Security Information -- DSA-3056-1 libtasn1-3 DEBIAN www.debian.org Third Party Advisory
www.novell.com/support/kb/doc.php CONFIRM www.novell.com Third Party Advisory
About Secunia Research | Flexera SECUNIA secunia.com Third Party Advisory
About Secunia Research | Flexera SECUNIA secunia.com Third Party Advisory
www.novell.com/support/kb/doc.php CONFIRM www.novell.com Third Party Advisory
Security Advisory SA59408 - Novell Open Enterprise Server GnuTLS Multiple Vulnerabilities - Secunia SECUNIA secunia.com Third Party Advisory
Security Advisory SA59021 - Oracle Linux update for gnutls - Secunia SECUNIA secunia.com Third Party Advisory
About Secunia Research | Flexera SECUNIA secunia.com Third Party Advisory
1102022 – (CVE-2014-3467) CVE-2014-3467 libtasn1: multiple boundary check issues CONFIRM bugzilla.redhat.com Issue Tracking, Patch, Third Party Advisory
Security Advisory SA58591 - Oracle Linux update for libtasn1 - Secunia SECUNIA secunia.com Third Party Advisory
Red Hat Customer Portal REDHAT rhn.redhat.com Third Party Advisory
Red Hat Customer Portal REDHAT rhn.redhat.com Third Party Advisory
linux.oracle.com | ELSA-2014-0596 - libtasn1 security update CONFIRM linux.oracle.com Third Party Advisory
Red Hat Customer Portal REDHAT rhn.redhat.com Third Party Advisory
GNU Libtasn1 3.6 released MLIST lists.gnu.org Patch, Vendor Advisory
Support / Security / Advisories / / MDVSA-2015:116 | Mandriva MANDRIVA www.mandriva.com Third Party Advisory
Mageia Advisory: MGASA-2014-0247 - Updated libtasn1 packages fix CVE-2014-3467-9 CONFIRM advisories.mageia.org Third Party Advisory
[security-announce] SUSE-SU-2014:0788-1: important: Security update for SUSE lists.opensuse.org Mailing List, Third Party Advisory
Red Hat Customer Portal REDHAT rhn.redhat.com Third Party Advisory
[security-announce] SUSE-SU-2014:0758-1: important: Security update for SUSE lists.opensuse.org Mailing List, Third Party Advisory
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 900178 CBL-Mariner Linux Security Update for gnutls 3.6.14
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report