First published: Wed Nov 09 2011(Updated: )
A flaw was reported [1] in the GnuTLS gnutls_session_get_data() function, which could overflow a too-short buffer parameter allocated by the caller. The test which was to avoid such buffer overflows was not working. A malicious server could use this flaw in a vulnerable client to send a larger SessionTicket in the hope of overflowing the client. Upstream has indicated that they are unaware of any client software that does not properly use the session resumption functions; clients that perform session resumption as documented [2] are not vulnerable. [1] <a href="http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5596">http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5596</a> [2] <a href="http://www.gnu.org/s/gnutls/manual/html_node/Client-with-Resume-capability-example.html#Client-with-Resume-capability-example">http://www.gnu.org/s/gnutls/manual/html_node/Client-with-Resume-capability-example.html#Client-with-Resume-capability-example</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gnutls | <2.12.14 | 2.12.14 |
redhat/gnutls | <3.0.7 | 3.0.7 |
GNU GnuTLS | =2.12.0 | |
GNU GnuTLS | =2.12.1 | |
GNU GnuTLS | =2.12.2 | |
GNU GnuTLS | =2.12.3 | |
GNU GnuTLS | =2.12.4 | |
GNU GnuTLS | =2.12.5 | |
GNU GnuTLS | =2.12.6 | |
GNU GnuTLS | =2.12.6.1 | |
GNU GnuTLS | =2.12.7 | |
GNU GnuTLS | =2.12.8 | |
GNU GnuTLS | =2.12.9 | |
GNU GnuTLS | =2.12.10 | |
GNU GnuTLS | =2.12.11 | |
GNU GnuTLS | =2.12.12 | |
GNU GnuTLS | =2.12.13 | |
GNU GnuTLS | =3.0.0 | |
GNU GnuTLS | =3.0.1 | |
GNU GnuTLS | =3.0.2 | |
GNU GnuTLS | =3.0.3 | |
GNU GnuTLS | =3.0.4 | |
GNU GnuTLS | =3.0.5 | |
GNU GnuTLS | =3.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.