First published: Thu Apr 30 2009(Updated: )
lib/pk-libgcrypt.c in libgnutls in GnuTLS before 2.6.6 does not properly handle invalid DSA signatures, which allows remote attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a malformed DSA key that triggers a (1) free of an uninitialized pointer or (2) double free.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU GnuTLS | <2.6.6 | |
GNU GnuTLS | =2.3.5 | |
GNU GnuTLS | =1.6.0 | |
GNU GnuTLS | =2.0.0 | |
GNU GnuTLS | =1.5.0 | |
GNU GnuTLS | =1.2.8 | |
GNU GnuTLS | =1.1.14 | |
GNU GnuTLS | =2.3.4 | |
GNU GnuTLS | =1.7.3 | |
GNU GnuTLS | =1.4.1 | |
GNU GnuTLS | =1.4.3 | |
GNU GnuTLS | =2.6.1 | |
GNU GnuTLS | =1.2.11 | |
GNU GnuTLS | =1.1.21 | |
GNU GnuTLS | =1.7.5 | |
GNU GnuTLS | =1.7.11 | |
GNU GnuTLS | =1.0.20 | |
GNU GnuTLS | =1.2.5 | |
GNU GnuTLS | =2.2.4 | |
GNU GnuTLS | =1.0.17 | |
GNU GnuTLS | =1.2.4 | |
GNU GnuTLS | =1.3.1 | |
GNU GnuTLS | =1.0.24 | |
GNU GnuTLS | =1.7.15 | |
GNU GnuTLS | =1.6.1 | |
GNU GnuTLS | =1.0.21 | |
GNU GnuTLS | =1.4.2 | |
GNU GnuTLS | =1.7.8 | |
GNU GnuTLS | =1.7.0 | |
GNU GnuTLS | =2.1.0 | |
GNU GnuTLS | =2.3.1 | |
GNU GnuTLS | =1.0.16 | |
GNU GnuTLS | =2.2.5 | |
GNU GnuTLS | =2.1.1 | |
GNU GnuTLS | =2.3.8 | |
GNU GnuTLS | =1.7.18 | |
GNU GnuTLS | =1.1.20 | |
GNU GnuTLS | =2.1.7 | |
GNU GnuTLS | =2.1.4 | |
GNU GnuTLS | =1.2.10 | |
GNU GnuTLS | =1.5.3 | |
GNU GnuTLS | =1.1.22 | |
GNU GnuTLS | =1.6.3 | |
GNU GnuTLS | =2.6.0 | |
GNU GnuTLS | =2.1.6 | |
GNU GnuTLS | =1.4.5 | |
GNU GnuTLS | =1.5.1 | |
GNU GnuTLS | =1.4.0 | |
GNU GnuTLS | =1.7.4 | |
GNU GnuTLS | =1.7.13 | |
GNU GnuTLS | =2.3.2 | |
GNU GnuTLS | =2.3.9 | |
GNU GnuTLS | =2.2.2 | |
GNU GnuTLS | =2.2.0 | |
GNU GnuTLS | =2.3.11 | |
GNU GnuTLS | =1.3.4 | |
GNU GnuTLS | =2.6.2 | |
GNU GnuTLS | =1.0.19 | |
GNU GnuTLS | =1.7.2 | |
GNU GnuTLS | =1.2.1 | |
GNU GnuTLS | =1.1.19 | |
GNU GnuTLS | =2.0.4 | |
GNU GnuTLS | =2.6.3 | |
GNU GnuTLS | =1.1.18 | |
GNU GnuTLS | =1.5.4 | |
GNU GnuTLS | =1.7.9 | |
GNU GnuTLS | =2.4.0 | |
GNU GnuTLS | =2.1.3 | |
GNU GnuTLS | =2.4.1 | |
GNU GnuTLS | =1.7.10 | |
GNU GnuTLS | =1.1.13 | |
GNU GnuTLS | =1.2.8.1a1 | |
GNU GnuTLS | =2.3.7 | |
GNU GnuTLS | =2.0.3 | |
GNU GnuTLS | =1.2.2 | |
GNU GnuTLS | =1.7.19 | |
GNU GnuTLS | =1.5.5 | |
GNU GnuTLS | =1.2.0 | |
GNU GnuTLS | =1.0.18 | |
GNU GnuTLS | =1.2.7 | |
GNU GnuTLS | =1.3.2 | |
GNU GnuTLS | =1.0.25 | |
GNU GnuTLS | =1.1.15 | |
GNU GnuTLS | =2.1.2 | |
GNU GnuTLS | =1.0.23 | |
GNU GnuTLS | =2.4.2 | |
GNU GnuTLS | =1.3.0 | |
GNU GnuTLS | =1.3.5 | |
GNU GnuTLS | =1.7.14 | |
GNU GnuTLS | =1.1.23 | |
GNU GnuTLS | =1.2.3 | |
GNU GnuTLS | =2.6.4 | |
GNU GnuTLS | =1.2.6 | |
GNU GnuTLS | =2.3.6 | |
GNU GnuTLS | =1.2.9 | |
GNU GnuTLS | =1.7.17 | |
GNU GnuTLS | =2.3.3 | |
GNU GnuTLS | =2.1.8 | |
GNU GnuTLS | =1.7.7 | |
GNU GnuTLS | =2.0.1 | |
GNU GnuTLS | =1.7.6 | |
GNU GnuTLS | =2.2.1 | |
GNU GnuTLS | =2.1.5 | |
GNU GnuTLS | =1.7.1 | |
GNU GnuTLS | <=2.6.5 | |
GNU GnuTLS | =1.5.2 | |
GNU GnuTLS | =1.7.16 | |
GNU GnuTLS | =1.7.12 | |
GNU GnuTLS | =1.1.16 | |
GNU GnuTLS | =2.3.10 | |
GNU GnuTLS | =1.0.22 | |
GNU GnuTLS | =2.0.2 | |
GNU GnuTLS | =2.3.0 | |
GNU GnuTLS | =1.6.2 | |
GNU GnuTLS | =2.2.3 | |
GNU GnuTLS | =1.4.4 | |
GNU GnuTLS | =1.1.17 | |
GNU GnuTLS | =1.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2009-1415 is classified as high due to the potential for denial of service attacks.
To fix CVE-2009-1415, upgrade to GnuTLS version 2.6.6 or later.
CVE-2009-1415 affects versions of GnuTLS prior to 2.6.6, including those listed from 1.0.0 to 2.6.5.
CVE-2009-1415 can lead to an application crash and may expose systems to further vulnerabilities via malformed DSA keys.
Yes, avoiding the use of DSA signatures or validating inputs can serve as a temporary workaround for CVE-2009-1415.