First published: Fri Jan 29 2021(Updated: )
GnuTLS is vulnerable to a denial of service, caused by a use-after-free issue in client_send_params in lib/ext/pre_shared_key.c. By sending a specially-crafted request, an attacker could exploit this vulnerability to cause memory corruption and other consequences.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM QRadar SIEM | <=7.5.0 GA | |
IBM QRadar SIEM | <=7.4.3 GA - 7.4.3 FP4 | |
IBM QRadar SIEM | <=7.3.3 GA - 7.3.3 FP10 | |
redhat/gnutls | <3.7.1 | 3.7.1 |
GNU GnuTLS | >=3.6.3<3.7.1 | |
Redhat Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20232 is a vulnerability in GnuTLS that could allow an attacker to cause a denial of service by exploiting a use-after-free issue in client_send_params in lib/ext/pre_shared_key.c.
CVE-2021-20232 could lead to memory corruption and other consequences, potentially resulting in a denial of service.
CVE-2021-20232 has a severity rating of 7.4, which is considered high.
To fix CVE-2021-20232 in IBM QRadar SIEM version 7.5.0 GA, you should apply the patch available at the following URL: [Patch URL]
To fix CVE-2021-20232 in IBM QRadar SIEM version 7.4.3 GA - 7.4.3 FP4, you should apply the patch available at the following URL: [Patch URL]
To fix CVE-2021-20232 in IBM QRadar SIEM version 7.3.3 GA - 7.3.3 FP10, you should apply the patch available at the following URL: [Patch URL]