First published: Thu Nov 13 2008(Updated: )
The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers to insert a spoofed certificate for any Distinguished Name (DN).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU GnuTLS | <2.6.1 | |
Fedoraproject Fedora | =8 | |
Fedoraproject Fedora | =9 | |
Canonical Ubuntu Linux | =6.06 | |
Canonical Ubuntu Linux | =7.10 | |
Canonical Ubuntu Linux | =8.04 | |
Canonical Ubuntu Linux | =8.10 | |
Debian Debian Linux | =4.0 | |
openSUSE openSUSE | >=10.3<=11.1 | |
SUSE Linux Enterprise | =10.0 | |
SUSE Linux Enterprise | =11.0 | |
SUSE Linux Enterprise Server | =10 | |
SUSE Linux Enterprise Server | =11 | |
GNU GnuTLS | <=2.6.0 | |
GNU GnuTLS | =1.0.16 | |
GNU GnuTLS | =1.0.17 | |
GNU GnuTLS | =1.0.18 | |
GNU GnuTLS | =1.0.19 | |
GNU GnuTLS | =1.0.20 | |
GNU GnuTLS | =1.0.21 | |
GNU GnuTLS | =1.0.22 | |
GNU GnuTLS | =1.0.23 | |
GNU GnuTLS | =1.0.24 | |
GNU GnuTLS | =1.0.25 | |
GNU GnuTLS | =1.1.13 | |
GNU GnuTLS | =1.1.14 | |
GNU GnuTLS | =1.1.15 | |
GNU GnuTLS | =1.1.16 | |
GNU GnuTLS | =1.1.17 | |
GNU GnuTLS | =1.1.18 | |
GNU GnuTLS | =1.1.19 | |
GNU GnuTLS | =1.1.20 | |
GNU GnuTLS | =1.1.21 | |
GNU GnuTLS | =1.1.22 | |
GNU GnuTLS | =1.1.23 | |
GNU GnuTLS | =1.2.0 | |
GNU GnuTLS | =1.2.1 | |
GNU GnuTLS | =1.2.2 | |
GNU GnuTLS | =1.2.3 | |
GNU GnuTLS | =1.2.4 | |
GNU GnuTLS | =1.2.5 | |
GNU GnuTLS | =1.2.6 | |
GNU GnuTLS | =1.2.7 | |
GNU GnuTLS | =1.2.8 | |
GNU GnuTLS | =1.2.8.1a1 | |
GNU GnuTLS | =1.2.9 | |
GNU GnuTLS | =1.2.10 | |
GNU GnuTLS | =1.2.11 | |
GNU GnuTLS | =1.3.0 | |
GNU GnuTLS | =1.3.1 | |
GNU GnuTLS | =1.3.2 | |
GNU GnuTLS | =1.3.3 | |
GNU GnuTLS | =1.3.4 | |
GNU GnuTLS | =1.3.5 | |
GNU GnuTLS | =1.4.0 | |
GNU GnuTLS | =1.4.1 | |
GNU GnuTLS | =1.4.2 | |
GNU GnuTLS | =1.4.3 | |
GNU GnuTLS | =1.4.4 | |
GNU GnuTLS | =1.4.5 | |
GNU GnuTLS | =1.5.0 | |
GNU GnuTLS | =1.5.1 | |
GNU GnuTLS | =1.5.2 | |
GNU GnuTLS | =1.5.3 | |
GNU GnuTLS | =1.5.4 | |
GNU GnuTLS | =1.5.5 | |
GNU GnuTLS | =1.6.0 | |
GNU GnuTLS | =1.6.1 | |
GNU GnuTLS | =1.6.2 | |
GNU GnuTLS | =1.6.3 | |
GNU GnuTLS | =1.7.0 | |
GNU GnuTLS | =1.7.1 | |
GNU GnuTLS | =1.7.2 | |
GNU GnuTLS | =1.7.3 | |
GNU GnuTLS | =1.7.4 | |
GNU GnuTLS | =1.7.5 | |
GNU GnuTLS | =1.7.6 | |
GNU GnuTLS | =1.7.7 | |
GNU GnuTLS | =1.7.8 | |
GNU GnuTLS | =1.7.9 | |
GNU GnuTLS | =1.7.10 | |
GNU GnuTLS | =1.7.11 | |
GNU GnuTLS | =1.7.12 | |
GNU GnuTLS | =1.7.13 | |
GNU GnuTLS | =1.7.14 | |
GNU GnuTLS | =1.7.15 | |
GNU GnuTLS | =1.7.16 | |
GNU GnuTLS | =1.7.17 | |
GNU GnuTLS | =1.7.18 | |
GNU GnuTLS | =1.7.19 | |
GNU GnuTLS | =2.0.0 | |
GNU GnuTLS | =2.0.1 | |
GNU GnuTLS | =2.0.2 | |
GNU GnuTLS | =2.0.3 | |
GNU GnuTLS | =2.0.4 | |
GNU GnuTLS | =2.1.0 | |
GNU GnuTLS | =2.1.1 | |
GNU GnuTLS | =2.1.2 | |
GNU GnuTLS | =2.1.3 | |
GNU GnuTLS | =2.1.4 | |
GNU GnuTLS | =2.1.5 | |
GNU GnuTLS | =2.1.6 | |
GNU GnuTLS | =2.1.7 | |
GNU GnuTLS | =2.1.8 | |
GNU GnuTLS | =2.2.0 | |
GNU GnuTLS | =2.2.1 | |
GNU GnuTLS | =2.2.2 | |
GNU GnuTLS | =2.2.3 | |
GNU GnuTLS | =2.2.4 | |
GNU GnuTLS | =2.2.5 | |
GNU GnuTLS | =2.3.0 | |
GNU GnuTLS | =2.3.1 | |
GNU GnuTLS | =2.3.2 | |
GNU GnuTLS | =2.3.3 | |
GNU GnuTLS | =2.3.4 | |
GNU GnuTLS | =2.3.5 | |
GNU GnuTLS | =2.3.6 | |
GNU GnuTLS | =2.3.7 | |
GNU GnuTLS | =2.3.8 | |
GNU GnuTLS | =2.3.9 | |
GNU GnuTLS | =2.3.10 | |
GNU GnuTLS | =2.3.11 | |
GNU GnuTLS | =2.4.0 | |
GNU GnuTLS | =2.4.1 | |
GNU GnuTLS | =2.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.