Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-0282

Опубликовано: 24 мар. 2015
Источник: debian

Описание

GnuTLS before 3.1.0 does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate, which allows remote attackers to conduct downgrade attacks via unspecified vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnutls26removedpackage
gnutls28not-affectedpackage

Примечания

  • http://www.gnutls.org/security.html#GNUTLS-SA-2015-1

Связанные уязвимости

ubuntu
почти 11 лет назад

GnuTLS before 3.1.0 does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate, which allows remote attackers to conduct downgrade attacks via unspecified vectors.

redhat
почти 11 лет назад

GnuTLS before 3.1.0 does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate, which allows remote attackers to conduct downgrade attacks via unspecified vectors.

nvd
почти 11 лет назад

GnuTLS before 3.1.0 does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate, which allows remote attackers to conduct downgrade attacks via unspecified vectors.

github
больше 3 лет назад

GnuTLS before 3.1.0 does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate, which allows remote attackers to conduct downgrade attacks via unspecified vectors.

oracle-oval
больше 10 лет назад

ELSA-2015-1457: gnutls security and bug fix update (MODERATE)