CVE-2024-12133
Published: February 7, 2025Last modified: February 14, 2025
Description
A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.3 |
Attack Vector | NETWORK |
Attack complexity | LOW |
Privileges required | NONE |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | NONE |
Integrity impact | NONE |
Availability impact | LOW |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | libtasn1 | Fixed (4.19.0-r1) |
Stream | libtasn1 | Fixed (4.20.0-r0) |
References
- http://www.openwall.com/lists/oss-security/2025/02/06/6
- https://access.redhat.com/errata/RHSA-2025:4049
- https://access.redhat.com/errata/RHSA-2025:7077
- https://access.redhat.com/errata/RHSA-2025:8021
- https://access.redhat.com/errata/RHSA-2025:8385
- https://access.redhat.com/security/cve/CVE-2024-12133
- https://bugzilla.redhat.com/show_bug.cgi?id=2344611
- https://gitlab.com/gnutls/libtasn1/-/issues/52
- https://lists.debian.org/debian-lts-announce/2025/02/msg00025.html
- https://security.netapp.com/advisory/ntap-20250523-0003/