{"id":"USN-3547-1","summary":"libtasn1-6 vulnerabilities","details":"It was discovered that Libtasn1 incorrectly handled certain files.\nIf a user were tricked into opening a crafted file, an attacker could possibly\nuse this to cause a denial of service. This issue only affected Ubuntu 14.04\nLTS and Ubuntu 16.04 LTS. (CVE-2017-10790)\n\nIt was discovered that Libtasn1 incorrectly handled certain inputs.\nAn attacker could possibly use this to cause Libtasn1 to hang, resulting\nin a denial of service. This issue only affected Ubuntu 16.04 LTS and\nUbuntu 17.10. (CVE-2018-6003)\n","modified":"2026-02-10T04:41:16Z","published":"2018-01-25T19:23:50Z","related":["UBUNTU-CVE-2017-10790","UBUNTU-CVE-2018-6003"],"upstream":["CVE-2017-10790","CVE-2018-6003","UBUNTU-CVE-2017-10790","UBUNTU-CVE-2018-6003"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3547-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10790"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-6003"}],"affected":[{"package":{"name":"libtasn1-6","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/libtasn1-6@3.4-3ubuntu0.6?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.4-3ubuntu0.6"}]}],"versions":["3.3-2","3.4-2","3.4-3","3.4-3ubuntu0.1","3.4-3ubuntu0.2","3.4-3ubuntu0.3","3.4-3ubuntu0.4","3.4-3ubuntu0.5"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"3.4-3ubuntu0.6","binary_name":"libtasn1-3-bin"},{"binary_version":"3.4-3ubuntu0.6","binary_name":"libtasn1-3-dev"},{"binary_version":"3.4-3ubuntu0.6","binary_name":"libtasn1-6"},{"binary_version":"3.4-3ubuntu0.6","binary_name":"libtasn1-6-dev"},{"binary_version":"3.4-3ubuntu0.6","binary_name":"libtasn1-bin"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2017-10790","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}],"ecosystem":"Ubuntu:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3547-1.json"}},{"package":{"name":"libtasn1-6","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/libtasn1-6@4.7-3ubuntu0.16.04.3?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.7-3ubuntu0.16.04.3"}]}],"versions":["4.5-2","4.7-2","4.7-3","4.7-3ubuntu0.16.04.1","4.7-3ubuntu0.16.04.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.7-3ubuntu0.16.04.3","binary_name":"libtasn1-3-bin"},{"binary_version":"4.7-3ubuntu0.16.04.3","binary_name":"libtasn1-6"},{"binary_version":"4.7-3ubuntu0.16.04.3","binary_name":"libtasn1-6-dev"},{"binary_version":"4.7-3ubuntu0.16.04.3","binary_name":"libtasn1-bin"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2017-10790","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-6003","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3547-1.json"}}],"schema_version":"1.7.3"}