Lucene search

K
archlinuxArchLinuxASA-201609-25
HistorySep 26, 2016 - 12:00 a.m.

[ASA-201609-25] gnutls: certificate verification bypass

2016-09-2600:00:00
security.archlinux.org
14

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.006 Low

EPSS

Percentile

78.6%

Arch Linux Security Advisory ASA-201609-25

Severity: Medium
Date : 2016-09-26
CVE-ID : CVE-2016-7444
Package : gnutls
Type : certificate verification bypass
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE

Summary

The package gnutls before version 3.4.15-1 is vulnerable to certificate
verification bypass.

Resolution

Upgrade to 3.4.15-1.

pacman -Syu “gnutls>=3.4.15-1”

The problem has been fixed upstream in version 3.4.15.

Workaround

None.

Description

Incorrect length validation on gnutls’s gnutls_ocsp_resp_check_crt
method can allow an attacker to use a OCSP response for a different
certificate (but from the same CA) to continue using a revoked
certificate. This can happen if the serial from the revoked certificate
is a prefix of the other one, and the additional bytes happen to be
equal on the system doing the verification.

Impact

A remote attacker is able to bypass certificate verification and
continue using a revoked certificate under certain circumstances.

References

https://lists.gnupg.org/pipermail/gnutls-devel/2016-September/008146.html
https://gitlab.com/gnutls/gnutls/commit/964632f37dfdfb914ebc5e49db4fa29af35b1de9
https://access.redhat.com/security/cve/CVE-2016-7444

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanygnutls< 3.4.15-1UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.006 Low

EPSS

Percentile

78.6%