Description
In LibTomCrypt through 1.18.2, the der_decode_utf8_string function (in der_decode_utf8_string.c) does not properly detect certain invalid UTF-8 sequences. This allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) or read information from other memory locations via carefully crafted DER-encoded data.
References (10)
Core 10
Core References
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2019/10/msg00010.html
Mailing List vendor-advisory
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00020.html
Mailing List vendor-advisory
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00041.html
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YU5OMCY3PX54YVI4FMNDEENHDJZJ3RJW/
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47YP5SXQ4RY6KMTK2HI5ZZR244XKRMCZ/
Exploit, Third Party Advisory
https://github.com/libtom/libtomcrypt/issues/507
Patch, Third Party Advisory
https://github.com/libtom/libtomcrypt/pull/508
Permissions Required
https://vuldb.com/?id.142995
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/47YP5SXQ4RY6KMTK2HI5ZZR244XKRMCZ/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/YU5OMCY3PX54YVI4FMNDEENHDJZJ3RJW/
Scores
CVSS v3
9.1
EPSS
0.0047
EPSS Percentile
64.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (2)
debian/debian_linux
8.0
libtom/libtomcrypt
< 1.18.2
Published
Oct 09, 2019
Tracked Since
Feb 18, 2026