First published: Fri Aug 14 2015(Updated: )
GnuTLS before 2.9.10 does not verify the activation and expiration dates of CA certificates, which allows man-in-the-middle attackers to spoof servers via a certificate issued by a CA certificate that is (1) not yet valid or (2) no longer valid.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU GnuTLS | <=2.9.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8155 is classified as a medium severity vulnerability due to the potential for man-in-the-middle attacks.
To fix CVE-2014-8155, upgrade GnuTLS to version 2.9.10 or later.
CVE-2014-8155 allows attackers to spoof servers by using certificates from CA certificates that are not yet valid or have expired.
CVE-2014-8155 affects GnuTLS versions prior to 2.9.10.
CVE-2014-8155 compromises the integrity of server communication by allowing unauthenticated access via invalid certificates.