{"id":"UBUNTU-CVE-2014-3469","details":"The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.","modified":"2026-02-04T03:47:38.650484Z","published":"2014-06-05T00:00:00Z","related":["USN-2294-1"],"upstream":["CVE-2014-3469"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-3469"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2294-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2014-3469"}],"affected":[{"package":{"name":"libtasn1-6","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/libtasn1-6@3.4-3ubuntu0.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.4-3ubuntu0.1"}]}],"versions":["3.3-2","3.4-2","3.4-3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"3.4-3ubuntu0.1","binary_name":"libtasn1-3-bin"},{"binary_version":"3.4-3ubuntu0.1","binary_name":"libtasn1-3-dev"},{"binary_version":"3.4-3ubuntu0.1","binary_name":"libtasn1-6"},{"binary_version":"3.4-3ubuntu0.1","binary_name":"libtasn1-6-dev"},{"binary_version":"3.4-3ubuntu0.1","binary_name":"libtasn1-bin"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-3469.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}