Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-13777

Опубликовано: 03 июн. 2020
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.

A flaw was found in GnuTLS, in versions starting from 3.6.4, where it does not session the ticket encryption key in a secure fashion by the application which is connecting. This flaw allows an attacker to craft a man-in-the-middle-attack, with the ability to bypass the TLS1.3 authentication and also recover older conversations when TLS1.2 is in use. The highest threat to this flaw is to confidentiality and integrity.

Отчет

GnuTLS versions as shipped with Red Hat Enterprise Linux 7 and earlier are not affected, as the bug was introduced in upstream at GnuTLS version 3.6.4. The older versions do not carry the affected code.

Меры по смягчению последствий

There's no available mitigation for this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5gnutlsNot affected
Red Hat Enterprise Linux 6gnutlsNot affected
Red Hat Enterprise Linux 7gnutlsNot affected
Red Hat Enterprise Linux 8gnutlsFixedRHSA-2020:263722.06.2020
Red Hat Enterprise Linux 8gnutlsFixedRHSA-2020:263722.06.2020
Red Hat Enterprise Linux 8.0 Update Services for SAP SolutionsgnutlsFixedRHSA-2020:263922.06.2020
Red Hat Enterprise Linux 8.1 Extended Update SupportgnutlsFixedRHSA-2020:263822.06.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-345
https://bugzilla.redhat.com/show_bug.cgi?id=1843723gnutls: session resumption works without master key allowing MITM

EPSS

Процентиль: 77%
0.01082
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
ubuntu
около 5 лет назад

GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.

CVSS3: 7.4
nvd
около 5 лет назад

GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.

CVSS3: 7.4
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 7.4
debian
около 5 лет назад

GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting ...

suse-cvrf
около 5 лет назад

Security update for gnutls

EPSS

Процентиль: 77%
0.01082
Низкий

7.4 High

CVSS3