First published: Tue Mar 24 2015(Updated: )
GnuTLS before 3.1.0 does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate, which allows remote attackers to conduct downgrade attacks via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU GnuTLS | <=3.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0282 is classified as a medium severity vulnerability.
To fix CVE-2015-0282, upgrade GnuTLS to version 3.1.0 or later.
CVE-2015-0282 can allow attackers to conduct downgrade attacks.
GnuTLS versions prior to 3.1.0 are affected by CVE-2015-0282.
CVE-2015-0282 exploits the RSA PKCS #1 signature algorithm verification process.