First published: Mon Feb 10 2025(Updated: )
A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gnutls28 | <=3.7.1-5+deb11u5<=3.7.9-2+deb12u3 | 3.7.1-5+deb11u7 3.7.9-2+deb12u4 3.8.9-2 |
F5 Traffix Systems Signaling Delivery Controller | =5.2.0 | |
F5 Traffix Systems Signaling Delivery Controller | ||
F5 Traffix Systems Signaling Delivery Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12243 is classified as a medium severity vulnerability due to its potential to cause resource exhaustion.
To fix CVE-2024-12243, update to the latest versions of GnuTLS and libtasn1 that contain the security patch.
CVE-2024-12243 affects users and applications that utilize GnuTLS and libtasn1 for ASN.1 data processing.
The implications of CVE-2024-12243 include potential denial of service due to high resource consumption from processing malicious DER-encoded certificates.
Attackers can exploit CVE-2024-12243 by sending specially crafted DER-encoded certificate data to the affected system.