First published: Fri Nov 07 2014(Updated: )
IssueDescription: An out-of-bounds memory write flaw was found in the way GnuTLS parsed certain ECC (Elliptic Curve Cryptography) certificates or certificate signing requests (CSR). A malicious user could create a specially crafted ECC certificate or a certificate signing request that, when processed by an application compiled against GnuTLS (for example, certtool), could cause that application to crash or execute arbitrary code with the permissions of the user running the application.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gnutls | <3.1.28 | 3.1.28 |
redhat/gnutls | <3.2.20 | 3.2.20 |
redhat/gnutls | <3.3.10 | 3.3.10 |
GnuTLS | =3.0 | |
GnuTLS | =3.0.0 | |
GnuTLS | =3.0.1 | |
GnuTLS | =3.0.2 | |
GnuTLS | =3.0.3 | |
GnuTLS | =3.0.4 | |
GnuTLS | =3.0.5 | |
GnuTLS | =3.0.6 | |
GnuTLS | =3.0.7 | |
GnuTLS | =3.0.8 | |
GnuTLS | =3.0.9 | |
GnuTLS | =3.0.10 | |
GnuTLS | =3.0.11 | |
GnuTLS | =3.0.12 | |
GnuTLS | =3.0.13 | |
GnuTLS | =3.0.14 | |
GnuTLS | =3.0.15 | |
GnuTLS | =3.0.16 | |
GnuTLS | =3.0.17 | |
GnuTLS | =3.0.18 | |
GnuTLS | =3.0.19 | |
GnuTLS | =3.0.20 | |
GnuTLS | =3.0.21 | |
GnuTLS | =3.0.22 | |
GnuTLS | =3.0.23 | |
GnuTLS | =3.0.24 | |
GnuTLS | =3.0.25 | |
GnuTLS | =3.0.26 | |
GnuTLS | =3.0.27 | |
GnuTLS | =3.0.28 | |
GnuTLS | =3.1.0 | |
GnuTLS | =3.1.1 | |
GnuTLS | =3.1.2 | |
GnuTLS | =3.1.3 | |
GnuTLS | =3.1.4 | |
GnuTLS | =3.1.5 | |
GnuTLS | =3.1.6 | |
GnuTLS | =3.1.7 | |
GnuTLS | =3.1.8 | |
GnuTLS | =3.1.9 | |
GnuTLS | =3.1.10 | |
GnuTLS | =3.1.11 | |
GnuTLS | =3.1.12 | |
GnuTLS | =3.1.13 | |
GnuTLS | =3.1.14 | |
GnuTLS | =3.1.15 | |
GnuTLS | =3.1.16 | |
GnuTLS | =3.1.17 | |
GnuTLS | =3.1.18 | |
GnuTLS | =3.1.19 | |
GnuTLS | =3.1.20 | |
GnuTLS | =3.1.21 | |
GnuTLS | =3.1.22 | |
GnuTLS | =3.1.23 | |
GnuTLS | =3.1.24 | |
GnuTLS | =3.1.25 | |
GnuTLS | =3.1.26 | |
GnuTLS | =3.1.27 | |
GnuTLS | =3.2.0 | |
GnuTLS | =3.2.1 | |
GnuTLS | =3.2.2 | |
GnuTLS | =3.2.3 | |
GnuTLS | =3.2.4 | |
GnuTLS | =3.2.5 | |
GnuTLS | =3.2.6 | |
GnuTLS | =3.2.7 | |
GnuTLS | =3.2.8 | |
GnuTLS | =3.2.8.1 | |
GnuTLS | =3.2.9 | |
GnuTLS | =3.2.10 | |
GnuTLS | =3.2.11 | |
GnuTLS | =3.2.12 | |
GnuTLS | =3.2.12.1 | |
GnuTLS | =3.2.13 | |
GnuTLS | =3.2.14 | |
GnuTLS | =3.2.15 | |
GnuTLS | =3.2.16 | |
GnuTLS | =3.2.17 | |
GnuTLS | =3.2.18 | |
GnuTLS | =3.2.19 | |
GnuTLS | =3.3.0 | |
GnuTLS | =3.3.0-pre0 | |
GnuTLS | =3.3.1 | |
GnuTLS | =3.3.2 | |
GnuTLS | =3.3.3 | |
GnuTLS | =3.3.4 | |
GnuTLS | =3.3.5 | |
GnuTLS | =3.3.6 | |
GnuTLS | =3.3.7 | |
GnuTLS | =3.3.8 | |
GnuTLS | =3.3.9 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
SUSE Linux | =12.3 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 | |
Ubuntu | =14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8564 is classified as a high severity vulnerability due to its potential to cause an out-of-bounds memory write.
To fix CVE-2014-8564, upgrade your GnuTLS to version 3.1.28, 3.2.20, or 3.3.10 or later.
CVE-2014-8564 affects various GnuTLS versions across different distributions including Red Hat and openSUSE.
CVE-2014-8564 can be exploited by attackers creating specially crafted ECC certificates or certificate signing requests.
Yes, patches for CVE-2014-8564 are included in the updated GnuTLS versions that resolve the vulnerability.