Home

Description

Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.

PUBLISHED Reserved 2025-11-13 | Published 2026-01-07 | Updated 2026-01-20 | Assigner certcc

Problem types

CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-121 Stack-based Buffer Overflow

Product status

Any version
affected

Credits

This issue was reported Benny Zelster from Microsoft Security Research finder

References

www.openwall.com/lists/oss-security/2026/01/08/5

www.kb.cert.org/vuls/id/271649

gitlab.com/gnutls/libtasn1 (Source Code Respoitory)

gitlab.com/gnutls/libtasn1/-/merge_requests/121 (Proposed Pull Request) patch

cve.org (CVE-2025-13151)

nvd.nist.gov (CVE-2025-13151)

Download JSON