Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-7444

Опубликовано: 27 сент. 2016
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.

РелизСтатусПримечание
artful

DNE

bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

esm-infra-legacy/trusty

not-affected

precise

not-affected

precise/esm

not-affected

trusty

not-affected

trusty/esm

not-affected

Показывать по

РелизСтатусПримечание
artful

not-affected

3.5.3-4ubuntu1
bionic

not-affected

3.5.3-4ubuntu1
cosmic

not-affected

3.5.3-4ubuntu1
devel

not-affected

3.5.3-4ubuntu1
disco

not-affected

3.5.3-4ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
esm-infra/bionic

not-affected

3.5.3-4ubuntu1
esm-infra/xenial

not-affected

3.4.10-4ubuntu1.2
precise

not-affected

code not present
precise/esm

DNE

precise was not-affected [code not present]

Показывать по

EPSS

Процентиль: 72%
0.00754
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
почти 9 лет назад

The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.

CVSS3: 7.5
nvd
почти 9 лет назад

The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.

CVSS3: 7.5
debian
почти 9 лет назад

The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS b ...

CVSS3: 7.5
github
около 3 лет назад

The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.

suse-cvrf
больше 8 лет назад

Security update for gnutls

EPSS

Процентиль: 72%
0.00754
Низкий

5 Medium

CVSS2

7.5 High

CVSS3