http://ift.tt/1bG6Owy While fuzzing GnuTLS I discovered a malformed certificate input sample that would cause a heap overflow read of 99 bytes in the DER decoding functions of Libtasn1. The heap overflow happens in the function _asn1_extract_der_octet(). This issue was reported to the Libtasn1 developer on 16th April. A fix was committed on 20th April and is part of the Libtasn1 4.5 release. This issue was found with american fuzzy lop and address sanitizer. http://ift.tt/1GJCnQR Git commit / fix http://ift.tt/1IsGKlJ Libtasn1 4.5 release notes http://ift.tt/1GJCnQX Sample malformed certificate exposing heap overflow (test with certtool -i --inder --infile=[sample] and address sanitizer or valgrind)
Source: Gmail -> IFTTT-> Blogger
No comments:
Post a Comment