CVE-2014-3467
Published on: 06/05/2014 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:25:46 PM UTC
Certain versions of Debian Linux from Debian contain the following vulnerability:
Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.
- CVE-2014-3467 has been assigned by
[email protected] to track the vulnerability
CVSS2 Score: 5 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | NONE | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
linux.oracle.com | ELSA-2014-0594 - gnutls security update | Third Party Advisory linux.oracle.com text/html |
![]() |
Security Advisory SA61888 - Debian update for libtasn1-3 - Secunia | Third Party Advisory web.archive.org text/html |
![]() |
Security Advisory SA58614 - Red Hat update for libtasn1 - Secunia | Third Party Advisory web.archive.org text/html |
![]() |
No Description Provided | Third Party Advisory support.f5.com text/html |
![]() |
Debian -- Security Information -- DSA-3056-1 libtasn1-3 | Third Party Advisory www.debian.org Depreciated Link text/html |
![]() |
No Description Provided | Third Party Advisory www.novell.com text/html |
![]() |
About Secunia Research | Flexera | Third Party Advisory web.archive.org text/html |
![]() |
About Secunia Research | Flexera | Third Party Advisory secunia.com Depreciated Link text/plain |
![]() |
No Description Provided | Third Party Advisory www.novell.com text/html |
![]() |
Security Advisory SA59408 - Novell Open Enterprise Server GnuTLS Multiple Vulnerabilities - Secunia | Third Party Advisory web.archive.org text/html |
![]() |
Security Advisory SA59021 - Oracle Linux update for gnutls - Secunia | Third Party Advisory web.archive.org text/html |
![]() |
About Secunia Research | Flexera | Third Party Advisory web.archive.org text/html |
![]() |
1102022 – (CVE-2014-3467) CVE-2014-3467 libtasn1: multiple boundary check issues | Issue Tracking Patch Third Party Advisory bugzilla.redhat.com text/html |
![]() |
Security Advisory SA58591 - Oracle Linux update for libtasn1 - Secunia | Third Party Advisory web.archive.org text/html |
![]() |
Red Hat Customer Portal | Third Party Advisory web.archive.org text/html Inactive LinkNot Archived |
![]() |
Red Hat Customer Portal | Third Party Advisory web.archive.org text/html Inactive LinkNot Archived |
![]() |
linux.oracle.com | ELSA-2014-0596 - libtasn1 security update | Third Party Advisory linux.oracle.com text/html |
![]() |
Red Hat Customer Portal | Third Party Advisory web.archive.org text/html Inactive LinkNot Archived |
![]() |
GNU Libtasn1 3.6 released | Patch Vendor Advisory lists.gnu.org text/html |
![]() |
Support / Security / Advisories / / MDVSA-2015:116 | Mandriva | Third Party Advisory www.mandriva.com text/html |
![]() |
Mageia Advisory: MGASA-2014-0247 - Updated libtasn1 packages fix CVE-2014-3467-9 | Third Party Advisory advisories.mageia.org text/html |
![]() |
[security-announce] SUSE-SU-2014:0788-1: important: Security update for | Mailing List Third Party Advisory lists.opensuse.org text/html |
![]() |
Red Hat Customer Portal | Third Party Advisory web.archive.org text/html Inactive LinkNot Archived |
![]() |
[security-announce] SUSE-SU-2014:0758-1: important: Security update for | Mailing List Third Party Advisory lists.opensuse.org text/html |
![]() |
Related QID Numbers
- 900178 CBL-Mariner Linux Security Update for gnutls 3.6.14
Known Affected Configurations (CPE V2.3)
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*:
- cpe:2.3:h:f5:arx:-:*:*:*:*:*:*:*:
- cpe:2.3:h:f5:arx:-:*:*:*:*:*:*:*:
- cpe:2.3:o:f5:arx_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*:
- cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*:
- cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*:
- cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*:
- cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*:
- cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*:
- cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*:
- cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*:
- cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*:
- cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*:
- cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*:
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*:
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*:
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*:
- cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*:
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*:
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*:
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*:
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*:
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE