First published: Fri Apr 14 2017(Updated: )
GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gnutls | <3.5.10 | 3.5.10 |
GnuTLS | <=3.5.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7869 is classified as a high severity vulnerability due to its potential for causing heap-based buffer overflow and out-of-bounds write issues.
To mitigate CVE-2017-7869, upgrade GnuTLS to version 3.5.10 or later.
CVE-2017-7869 affects GnuTLS versions prior to 3.5.10.
CVE-2017-7869 includes an integer overflow and a heap-based buffer overflow.
CVE-2017-7869 was identified in GnuTLS software versions released before February 20, 2017.