The asn1signature function in asn1.c in Cameron Hamilton-Rich axTLS through 2.1.5 has a Buffer Overflow that allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted certificate in the TLS certificate handshake message, because the result of getasn1_length() is not checked for a minimum or maximum size.
{
"binaries": [
{
"binary_name": "axhttpd",
"binary_version": "2.1.5+ds-1"
},
{
"binary_name": "libaxtls-dev",
"binary_version": "2.1.5+ds-1"
},
{
"binary_name": "libaxtls1",
"binary_version": "2.1.5+ds-1"
},
{
"binary_name": "libaxtlsp-perl",
"binary_version": "2.1.5+ds-1"
},
{
"binary_name": "lua-axtlsl",
"binary_version": "2.1.5+ds-1"
}
]
}
{
"binaries": [
{
"binary_name": "axhttpd",
"binary_version": "2.1.5+ds-1build2"
},
{
"binary_name": "libaxtls-dev",
"binary_version": "2.1.5+ds-1build2"
},
{
"binary_name": "libaxtls1",
"binary_version": "2.1.5+ds-1build2"
},
{
"binary_name": "libaxtlsp-perl",
"binary_version": "2.1.5+ds-1build2"
},
{
"binary_name": "lua-axtlsl",
"binary_version": "2.1.5+ds-1build2"
}
]
}