{"id":"CVE-2017-6891","details":"Two errors in the \"asn1_find_node()\" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.","modified":"2026-03-20T11:21:50.552321Z","published":"2017-05-22T19:29:00.250Z","related":["MGASA-2017-0159","SUSE-SU-2017:1886-1","SUSE-SU-2019:1379-1","SUSE-SU-2022:3797-1"],"references":[{"type":"WEB","url":"http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=5520704d075802df25ce4ffccc010ba1641bd484"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201710-11"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3861"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/98641"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1038619"},{"type":"REPORT","url":"https://secuniaresearch.flexerasoftware.com/advisories/76125/"},{"type":"FIX","url":"https://secuniaresearch.flexerasoftware.com/secunia_research/2017-11/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/bookkeeper","events":[{"introduced":"0"},{"last_affected":"2f08377f5c56f96389fb3a8e51844844537e118b"},{"introduced":"0"},{"last_affected":"4d8a5efe57d847ab2adb59ad026ddca076c60ca1"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.10"},{"introduced":"0"},{"last_affected":"4.12.1"}]}}],"versions":["release-4.10.0","release-4.10.0-docker"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-6891.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}