Описание
The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.
Релиз | Статус | Примечание |
---|---|---|
artful | DNE | |
bionic | DNE | |
cosmic | DNE | |
devel | DNE | |
disco | DNE | |
esm-infra-legacy/trusty | not-affected | |
precise | not-affected | |
precise/esm | not-affected | |
trusty | not-affected | |
trusty/esm | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
artful | not-affected | 3.5.3-4ubuntu1 |
bionic | not-affected | 3.5.3-4ubuntu1 |
cosmic | not-affected | 3.5.3-4ubuntu1 |
devel | not-affected | 3.5.3-4ubuntu1 |
disco | not-affected | 3.5.3-4ubuntu1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
esm-infra/bionic | not-affected | 3.5.3-4ubuntu1 |
esm-infra/xenial | not-affected | 3.4.10-4ubuntu1.2 |
precise | not-affected | code not present |
precise/esm | DNE | precise was not-affected [code not present] |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.
The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.
The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS b ...
The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.
EPSS
5 Medium
CVSS2
7.5 High
CVSS3