First published: Thu Apr 30 2009(Updated: )
lib/gnutls_pk.c in libgnutls in GnuTLS 2.5.0 through 2.6.5 generates RSA keys stored in DSA structures, instead of the intended DSA keys, which might allow remote attackers to spoof signatures on certificates or have unspecified other impact by leveraging an invalid DSA key.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GnuTLS | =2.6.1 | |
GnuTLS | =2.6.0 | |
GnuTLS | =2.5.0 | |
GnuTLS | =2.6.2 | |
GnuTLS | =2.6.3 | |
GnuTLS | =2.6.5 | |
GnuTLS | =2.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1416 has been rated as a high severity vulnerability due to its potential to allow remote attackers to spoof signatures.
To fix CVE-2009-1416, update GnuTLS to the latest version that is not vulnerable, specifically versions 2.6.6 or later.
CVE-2009-1416 affects GnuTLS versions 2.5.0 through 2.6.5.
CVE-2009-1416 can allow attackers to spoof signatures on certificates, potentially leading to interception and manipulation of secure communications.
CVE-2009-1416 is not a zero-day vulnerability as it was disclosed publicly and has available fixes.