Severity
7.5HIGH
EPSS
0.1%
top 80.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 7
Latest updateFeb 10

Description

Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

Debianlibtasn1-6< 4.21.0-2
Ubuntulibtasn1-6< 4.18.0-4ubuntu0.2+2
CVEListV5gnutls/libtasn14.20.0
NVDgnu/libtasn14.20.0

Patches

🔴Vulnerability Details

5
OSV
libtasn1-6 vulnerabilities2026-02-10
OSV
libtasn1-6 vulnerabilities2026-01-12
GHSA
GHSA-f433-vfwr-65r3: Stack-based buffer overflow in libtasn1 version: v42026-01-08
OSV
CVE-2025-13151: Stack-based buffer overflow in libtasn1 version: v42026-01-07
CVEList
CVE-2025-13151: Stack-based buffer overflow in libtasn1 version: v42026-01-07

📋Vendor Advisories

4
Ubuntu
Libtasn1 vulnerabilities2026-02-10
Ubuntu
Libtasn1 vulnerabilities2026-01-12
Red Hat
libtasn1: libtasn1: Denial of Service via stack-based buffer overflow in asn1_expend_octet_string2026-01-07
Debian
CVE-2025-13151: libtasn1-6 - Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to ...2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-13151 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2025-13151 (HIGH CVSS 7.5) | Stack-based buffer overflow in libt | cvebase.io