Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-7507

Опубликовано: 16 июн. 2017
Источник: debian

Описание

GnuTLS version 3.5.12 and earlier is vulnerable to a NULL pointer dereference while decoding a status response TLS extension with valid contents. This could lead to a crash of the GnuTLS server application.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnutls28fixed3.5.13-1experimentalpackage
gnutls28fixed3.5.8-6package
gnutls26removedpackage
gnutls26not-affectedwheezypackage

Примечания

  • https://gnutls.org/security.html#GNUTLS-SA-2017-4

  • https://gitlab.com/gnutls/gnutls/commit/4c4d35264fada08b6536425c051fb8e0b05ee86b

  • https://gitlab.com/gnutls/gnutls/commit/3efb6c5fd0e3822ec11879d5bcbea0e8d322cd03

  • https://gitlab.com/gnutls/gnutls/commit/e1d6c59a7b0392fb3b8b75035614084a53e2c8c9

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 8 лет назад

GnuTLS version 3.5.12 and earlier is vulnerable to a NULL pointer dereference while decoding a status response TLS extension with valid contents. This could lead to a crash of the GnuTLS server application.

CVSS3: 7.5
redhat
около 8 лет назад

GnuTLS version 3.5.12 and earlier is vulnerable to a NULL pointer dereference while decoding a status response TLS extension with valid contents. This could lead to a crash of the GnuTLS server application.

CVSS3: 7.5
nvd
около 8 лет назад

GnuTLS version 3.5.12 and earlier is vulnerable to a NULL pointer dereference while decoding a status response TLS extension with valid contents. This could lead to a crash of the GnuTLS server application.

CVSS3: 7.5
github
около 3 лет назад

GnuTLS version 3.5.12 and earlier is vulnerable to a NULL pointer dereference while decoding a status response TLS extension with valid contents. This could lead to a crash of the GnuTLS server application.

suse-cvrf
почти 8 лет назад

Security update for gnutls