First published: Fri Jan 09 2009(Updated: )
GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates, a different vulnerability than CVE-2014-1959.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gnutls | <0:1.4.1-14.el5_10 | 0:1.4.1-14.el5_10 |
redhat/gnutls | <2.7.6 | 2.7.6 |
GNU GnuTLS | =2.7.3 | |
GNU GnuTLS | =2.7.4 | |
GNU GnuTLS | =2.7.0 | |
GNU GnuTLS | =2.7.1 | |
GNU GnuTLS | <=2.7.5 | |
GNU GnuTLS | =2.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.