Description
The asn1_signature function in asn1.c in Cameron Hamilton-Rich axTLS through 2.1.5 has a Buffer Overflow that allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted certificate in the TLS certificate handshake message, because the result of get_asn1_length() is not checked for a minimum or maximum size.
References (5)
Core 5
Core References
Mailing List mailing-list
x_refsource_bugtraq
https://seclists.org/bugtraq/2019/Nov/44
Vendor Advisory x_refsource_misc
http://axtls.sourceforge.net
Various Sources x_refsource_misc
https://www.telekom.com/en/corporate-responsibility/data-protection-data-security/security/details/advisories-504842
Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/155500/axTLS-2.1.5-Denial-Of-Service.html
Scores
CVSS v3
7.5
EPSS
0.0100
EPSS Percentile
77.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-120
Status
published
Products (1)
axtls_project/axtls
< 2.1.5
Published
Dec 03, 2019
Tracked Since
Feb 18, 2026