First published: Fri Dec 31 2004(Updated: )
X.509 Certificate Signature Verification in Gnu transport layer security library (GnuTLS) 1.0.16 allows remote attackers to cause a denial of service (CPU consumption) via certificates containing long chains and signed with large RSA keys.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GnuTLS | =1.0.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2531 is considered a high severity vulnerability due to its potential to cause denial of service by exhausting CPU resources.
To fix CVE-2004-2531, upgrade GnuTLS to a version later than 1.0.16 that has addressed this vulnerability.
CVE-2004-2531 can lead to significant performance issues as the system may become unresponsive due to excessive CPU consumption caused by processing specific certificates.
CVE-2004-2531 specifically affects GnuTLS version 1.0.16.
No reliable workaround exists for CVE-2004-2531 other than upgrading to a patched version of GnuTLS.