Axtls Project

Axtls

8 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.03%
  • Veröffentlicht 06.06.2023 18:15:11
  • Zuletzt bearbeitet 08.01.2025 17:15:12

axTLS v2.1.5 was discovered to contain a heap buffer overflow in the bi_import function in axtls-code/crypto/bigint.c. This vulnerability allows attackers to cause a Denial of Service (DoS) when parsing a private key.

  • EPSS 0.48%
  • Veröffentlicht 03.12.2019 20:15:11
  • Zuletzt bearbeitet 21.11.2024 04:52:06

process_certificate in tls1.c in Cameron Hamilton-Rich axTLS through 2.1.5 has a Buffer Overflow via a crafted TLS certificate handshake message with zero certificates.

  • EPSS 1.19%
  • Veröffentlicht 03.12.2019 20:15:10
  • Zuletzt bearbeitet 21.11.2024 04:18:12

The asn1_signature function in asn1.c in Cameron Hamilton-Rich axTLS through 2.1.5 has a Buffer Overflow that allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted certificate in the TLS certificate handshake...

Exploit
  • EPSS 0.61%
  • Veröffentlicht 26.03.2019 02:29:00
  • Zuletzt bearbeitet 21.11.2024 04:50:45

tls1.c in Cameron Hamilton-Rich axTLS before 2.1.5 has a Buffer Overflow via a crafted sequence of TLS packets because the need_bytes value is mismanaged.

Exploit
  • EPSS 0.65%
  • Veröffentlicht 07.11.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:52:10

In sig_verify() in x509.c in axTLS version 2.1.3 and before, the PKCS#1 v1.5 signature verification blindly trusts the declared lengths in the ASN.1 structure. Consequently, when small public exponents are being used, a remote attacker can generate p...

  • EPSS 0.17%
  • Veröffentlicht 07.11.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:52:10

In sig_verify() in x509.c in axTLS version 2.1.3 and before, the PKCS#1 v1.5 signature verification does not reject excess data after the hash value. Consequently, a remote attacker can forge signatures when small public exponents are being used, whi...

Exploit
  • EPSS 0.17%
  • Veröffentlicht 07.11.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:52:23

In sig_verify() in x509.c in axTLS version 2.1.3 and before, the PKCS#1 v1.5 signature verification does not properly verify the ASN.1 metadata. Consequently, a remote attacker can forge signatures when small public exponents are being used, which co...

  • EPSS 0.29%
  • Veröffentlicht 22.01.2018 23:29:00
  • Zuletzt bearbeitet 21.11.2024 03:04:41

axTLS version 1.5.3 has a coding error in the ASN.1 parser resulting in the year (19)50 of UTCTime being misinterpreted as 2050.