Lucene search

K
cve[email protected]CVE-2010-0731
HistoryMar 26, 2010 - 6:30 p.m.

CVE-2010-0731

2010-03-2618:30:00
CWE-119
web.nvd.nist.gov
35
cve
gnutls
certificate revocation list
crl
buffer overflow
x.509 certificate
nvd
security vulnerability

6.9 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.039 Low

EPSS

Percentile

92.0%

The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote attackers to bypass the certificate revocation list (CRL) check and cause a stack-based buffer overflow via a crafted X.509 certificate, related to extraction of a serial number.

Affected configurations

NVD
Node
gnugnutlsRange1.2.0
OR
gnugnutlsMatch1.0.16
OR
gnugnutlsMatch1.0.17
OR
gnugnutlsMatch1.0.18
OR
gnugnutlsMatch1.0.19
OR
gnugnutlsMatch1.0.20
OR
gnugnutlsMatch1.0.21
OR
gnugnutlsMatch1.0.22
OR
gnugnutlsMatch1.0.23
OR
gnugnutlsMatch1.0.24
OR
gnugnutlsMatch1.0.25
OR
gnugnutlsMatch1.1.13
OR
gnugnutlsMatch1.1.14
OR
gnugnutlsMatch1.1.15
OR
gnugnutlsMatch1.1.16
OR
gnugnutlsMatch1.1.17
OR
gnugnutlsMatch1.1.18
OR
gnugnutlsMatch1.1.19
OR
gnugnutlsMatch1.1.20
OR
gnugnutlsMatch1.1.21
OR
gnugnutlsMatch1.1.22
OR
gnugnutlsMatch1.1.23

6.9 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.039 Low

EPSS

Percentile

92.0%