First published: Tue May 23 2017(Updated: )
It was found that GnuTLS would crash when receiving a client hello message with status_request extension that has a non-empty responder_id_list.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Traffix Systems Signaling Delivery Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1454621 is considered high due to the potential for application crashes.
To fix REDHAT-BUG-1454621, update to the latest version of GnuTLS that addresses the crash issue.
GnuTLS versions prior to the patch that resolves this vulnerability are affected by REDHAT-BUG-1454621.
REDHAT-BUG-1454621 could lead to Denial of Service (DoS) as a result of GnuTLS crashing when handling specific client hello messages.
Currently, there is no official workaround for REDHAT-BUG-1454621; the best mitigation is to apply the available patches.