Permalink
CVE-2024-12133
5.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): LOW
Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos
A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.
References
- https://access.redhat.com/security/cve/CVE-2024-12133 x_refsource_REDHAT vdb-entry
- RHBZ#2344611 issue-tracking x_refsource_REDHAT
- https://gitlab.com/gnutls/libtasn1/-/issues/52
- http://www.openwall.com/lists/oss-security/2025/02/06/6
- RHBZ#2344611 issue-tracking x_refsource_REDHAT
- https://gitlab.com/gnutls/libtasn1/-/issues/52
- https://access.redhat.com/security/cve/CVE-2024-12133 x_refsource_REDHAT vdb-entry
- http://www.openwall.com/lists/oss-security/2025/02/06/6
- https://lists.debian.org/debian-lts-announce/2025/02/msg00025.html
- https://gitlab.com/gnutls/libtasn1/-/issues/52
- https://access.redhat.com/security/cve/CVE-2024-12133 x_refsource_REDHAT vdb-entry
- RHBZ#2344611 issue-tracking x_refsource_REDHAT
- http://www.openwall.com/lists/oss-security/2025/02/06/6
- https://lists.debian.org/debian-lts-announce/2025/02/msg00025.html
- https://access.redhat.com/security/cve/CVE-2024-12133 x_refsource_REDHAT vdb-entry
- RHBZ#2344611 issue-tracking x_refsource_REDHAT
- https://gitlab.com/gnutls/libtasn1/-/issues/52
- http://www.openwall.com/lists/oss-security/2025/02/06/6
- https://lists.debian.org/debian-lts-announce/2025/02/msg00025.html
- https://access.redhat.com/security/cve/CVE-2024-12133 x_refsource_REDHAT vdb-entry
- RHBZ#2344611 issue-tracking x_refsource_REDHAT
- https://gitlab.com/gnutls/libtasn1/-/issues/52
- RHSA-2025:4049 vendor-advisory x_refsource_REDHAT
- http://www.openwall.com/lists/oss-security/2025/02/06/6
- https://lists.debian.org/debian-lts-announce/2025/02/msg00025.html
- RHBZ#2344611 issue-tracking x_refsource_REDHAT
- https://gitlab.com/gnutls/libtasn1/-/issues/52
- RHSA-2025:4049 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12133 x_refsource_REDHAT vdb-entry
- http://www.openwall.com/lists/oss-security/2025/02/06/6
- https://lists.debian.org/debian-lts-announce/2025/02/msg00025.html
- RHSA-2025:4049 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7077 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12133 x_refsource_REDHAT vdb-entry
- RHBZ#2344611 issue-tracking x_refsource_REDHAT
- https://gitlab.com/gnutls/libtasn1/-/issues/52
- http://www.openwall.com/lists/oss-security/2025/02/06/6
- https://lists.debian.org/debian-lts-announce/2025/02/msg00025.html
- RHSA-2025:4049 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7077 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8021 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12133 x_refsource_REDHAT vdb-entry
- RHBZ#2344611 issue-tracking x_refsource_REDHAT
- https://gitlab.com/gnutls/libtasn1/-/issues/52
- http://www.openwall.com/lists/oss-security/2025/02/06/6
- https://lists.debian.org/debian-lts-announce/2025/02/msg00025.html
- RHSA-2025:4049 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7077 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8021 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12133 x_refsource_REDHAT vdb-entry
- RHBZ#2344611 issue-tracking x_refsource_REDHAT
- https://gitlab.com/gnutls/libtasn1/-/issues/52
- https://lists.debian.org/debian-lts-announce/2025/02/msg00025.html
- http://www.openwall.com/lists/oss-security/2025/02/06/6
- RHSA-2025:4049 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7077 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8021 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12133 x_refsource_REDHAT vdb-entry
- RHBZ#2344611 issue-tracking x_refsource_REDHAT
- https://gitlab.com/gnutls/libtasn1/-/issues/52
- http://www.openwall.com/lists/oss-security/2025/02/06/6
- https://lists.debian.org/debian-lts-announce/2025/02/msg00025.html
- https://access.redhat.com/security/cve/CVE-2024-12133 x_refsource_REDHAT vdb-entry
- RHBZ#2344611 issue-tracking x_refsource_REDHAT
- https://gitlab.com/gnutls/libtasn1/-/issues/52
- RHSA-2025:4049 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7077 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8021 vendor-advisory x_refsource_REDHAT
- http://www.openwall.com/lists/oss-security/2025/02/06/6
- https://lists.debian.org/debian-lts-announce/2025/02/msg00025.html
- https://security.netapp.com/advisory/ntap-20250523-0003/
- RHSA-2025:8021 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12133 x_refsource_REDHAT vdb-entry
- RHBZ#2344611 issue-tracking x_refsource_REDHAT
- https://gitlab.com/gnutls/libtasn1/-/issues/52
- RHSA-2025:4049 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7077 vendor-advisory x_refsource_REDHAT
- http://www.openwall.com/lists/oss-security/2025/02/06/6
- https://lists.debian.org/debian-lts-announce/2025/02/msg00025.html
- https://security.netapp.com/advisory/ntap-20250523-0003/
- RHSA-2025:4049 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7077 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8021 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12133 x_refsource_REDHAT vdb-entry
- RHBZ#2344611 issue-tracking x_refsource_REDHAT
- https://gitlab.com/gnutls/libtasn1/-/issues/52
- http://www.openwall.com/lists/oss-security/2025/02/06/6
- https://lists.debian.org/debian-lts-announce/2025/02/msg00025.html
- https://security.netapp.com/advisory/ntap-20250523-0003/
- RHSA-2025:7077 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8021 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12133 x_refsource_REDHAT vdb-entry
- RHBZ#2344611 issue-tracking x_refsource_REDHAT
- https://gitlab.com/gnutls/libtasn1/-/issues/52
- RHSA-2025:4049 vendor-advisory x_refsource_REDHAT
- https://security.netapp.com/advisory/ntap-20250523-0003/
- http://www.openwall.com/lists/oss-security/2025/02/06/6
- https://lists.debian.org/debian-lts-announce/2025/02/msg00025.html
- RHSA-2025:17347 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4049 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7077 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8021 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12133 x_refsource_REDHAT vdb-entry
- RHBZ#2344611 issue-tracking x_refsource_REDHAT
- https://gitlab.com/gnutls/libtasn1/-/issues/52
- http://www.openwall.com/lists/oss-security/2025/02/06/6
- https://lists.debian.org/debian-lts-announce/2025/02/msg00025.html
- https://security.netapp.com/advisory/ntap-20250523-0003/
- RHSA-2025:17347 vendor-advisory x_refsource_REDHAT
- RHSA-2025:4049 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7077 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8021 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12133 x_refsource_REDHAT vdb-entry
- RHBZ#2344611 issue-tracking x_refsource_REDHAT
- https://gitlab.com/gnutls/libtasn1/-/issues/52
- http://www.openwall.com/lists/oss-security/2025/02/06/6
- https://lists.debian.org/debian-lts-announce/2025/02/msg00025.html
- https://security.netapp.com/advisory/ntap-20250523-0003/
Affected products
rhcos
libtasn1
- <4.20.0
- *
discovery/discovery-ui-rhel9
- *
discovery/discovery-server-rhel9
- *
registry.redhat.io/discovery/discovery-ui-rhel9
- *
registry.redhat.io/discovery/discovery-server-rhel9
- *