Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-1584

Опубликовано: 09 фев. 2026
Источник: redhat
CVSS3: 7.5

Описание

A flaw was found in gnutls. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted ClientHello message with an invalid Pre-Shared Key (PSK) binder value during the TLS handshake. This can lead to a NULL pointer dereference, causing the server to crash and resulting in a remote Denial of Service (DoS) condition.

Отчет

This IMPORTANT flaw in gnutls allows a remote, unauthenticated attacker to cause a Denial of Service. By sending a specially crafted ClientHello message with an invalid Pre-Shared Key (PSK) binder value, an attacker can trigger a NULL pointer dereference, leading to a crash of gnutls-based TLS servers configured to issue NewSessionTickets.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10gnutlsNot affected
Red Hat Enterprise Linux 6gnutlsNot affected
Red Hat Enterprise Linux 7gnutlsNot affected
Red Hat Enterprise Linux 8gnutlsNot affected
Red Hat Enterprise Linux 9gnutlsNot affected
Red Hat OpenShift Container Platform 4rhcosNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=2435258gnutls: gnutls: Remote Denial of Service via crafted ClientHello with invalid PSK binder

7.5 High

CVSS3

Связанные уязвимости

ubuntu
около 2 месяцев назад

A TLS 1.3 resumption attempt with an invalid PSK binder value in ClientHello could lead to a denial of service attack via crashing the server.

debian

Описание отсутствует

7.5 High

CVSS3