{"id":"UBUNTU-CVE-2014-3468","details":"The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.","modified":"2026-01-30T01:41:40.888752Z","published":"2014-06-05T00:00:00Z","related":["USN-2294-1"],"upstream":["CVE-2014-3468"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-3468"},{"type":"REPORT","url":"http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2294-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2014-3468"}],"affected":[{"package":{"name":"libtasn1-6","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/libtasn1-6@3.4-3ubuntu0.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.4-3ubuntu0.1"}]}],"versions":["3.3-2","3.4-2","3.4-3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libtasn1-3-bin","binary_version":"3.4-3ubuntu0.1"},{"binary_name":"libtasn1-3-dev","binary_version":"3.4-3ubuntu0.1"},{"binary_name":"libtasn1-6","binary_version":"3.4-3ubuntu0.1"},{"binary_name":"libtasn1-6-dev","binary_version":"3.4-3ubuntu0.1"},{"binary_name":"libtasn1-bin","binary_version":"3.4-3ubuntu0.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-3468.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}