First published: Fri Jan 09 2009(Updated: )
GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates, a different vulnerability than CVE-2014-1959.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gnutls | <0:1.4.1-14.el5_10 | 0:1.4.1-14.el5_10 |
redhat/gnutls | <2.7.6 | 2.7.6 |
GNU GnuTLS | =2.7.3 | |
GNU GnuTLS | =2.7.4 | |
GNU GnuTLS | =2.7.0 | |
GNU GnuTLS | =2.7.1 | |
GNU GnuTLS | <=2.7.5 | |
GNU GnuTLS | =2.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-5138 is classified as a moderate severity vulnerability due to its potential to allow unauthorized certificate issuance.
To fix CVE-2009-5138, update GnuTLS to version 2.7.6 or later, or enable the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag.
Versions of GnuTLS prior to 2.7.6 are affected by CVE-2009-5138.
Yes, CVE-2009-5138 can be exploited remotely by attackers leveraging a X.509 V1 certificate from a trusted CA.
CVE-2009-5138 allows X.509 V1 certificates to be incorrectly treated as intermediate CAs, bypassing validation restrictions.