### [CVE-2017-6891](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6891) ![](https://img.shields.io/static/v1?label=Product&message=GnuTLS%20libtasn1&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Stack-based%20buffer%20overflow%20leading%20to%20system%20compromise&color=brighgreen) ### Description Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon