Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Unknown

CVE-2023-33613

Disclosure Date: June 06, 2023 (last updated October 08, 2023)
axTLS v2.1.5 was discovered to contain a heap buffer overflow in the bi_import function in axtls-code/crypto/bigint.c. This vulnerability allows attackers to cause a Denial of Service (DoS) when parsing a private key.
Attacker Value
Unknown

CVE-2019-9689

Disclosure Date: December 03, 2019 (last updated November 27, 2024)
process_certificate in tls1.c in Cameron Hamilton-Rich axTLS through 2.1.5 has a Buffer Overflow via a crafted TLS certificate handshake message with zero certificates.
Attacker Value
Unknown

CVE-2019-10013

Disclosure Date: July 15, 2019 (last updated November 27, 2024)
The asn1_signature function in asn1.c in Cameron Hamilton-Rich axTLS through 2.1.5 has a Buffer Overflow that allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted certificate in the TLS certificate handshake message, because the result of get_asn1_length() is not checked for a minimum or maximum size.
Attacker Value
Unknown

CVE-2019-8981

Disclosure Date: March 26, 2019 (last updated November 27, 2024)
tls1.c in Cameron Hamilton-Rich axTLS before 2.1.5 has a Buffer Overflow via a crafted sequence of TLS packets because the need_bytes value is mismanaged.
0
Attacker Value
Unknown

CVE-2018-16149

Disclosure Date: November 07, 2018 (last updated November 27, 2024)
In sig_verify() in x509.c in axTLS version 2.1.3 and before, the PKCS#1 v1.5 signature verification blindly trusts the declared lengths in the ASN.1 structure. Consequently, when small public exponents are being used, a remote attacker can generate purposefully crafted signatures (and put them on X.509 certificates) to induce illegal memory access and crash the verifier.
0
Attacker Value
Unknown

CVE-2018-16253

Disclosure Date: November 07, 2018 (last updated November 27, 2024)
In sig_verify() in x509.c in axTLS version 2.1.3 and before, the PKCS#1 v1.5 signature verification does not properly verify the ASN.1 metadata. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation through fake X.509 certificates. This is an even more permissive variant of CVE-2006-4790 and CVE-2014-1568.
0
Attacker Value
Unknown

CVE-2018-16150

Disclosure Date: November 07, 2018 (last updated November 27, 2024)
In sig_verify() in x509.c in axTLS version 2.1.3 and before, the PKCS#1 v1.5 signature verification does not reject excess data after the hash value. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation through fake X.509 certificates. This is a variant of CVE-2006-4340.
0
Attacker Value
Unknown

CVE-2017-1000416

Disclosure Date: January 22, 2018 (last updated November 26, 2024)
axTLS version 1.5.3 has a coding error in the ASN.1 parser resulting in the year (19)50 of UTCTime being misinterpreted as 2050.
0