GnuTLS vulnerability CVE-2009-5138

2014-09-27T03:59:00
ID F5:K15623
Type f5
Reporter f5
Modified 2016-01-09T02:20:00

Description

GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates, a different vulnerability than CVE-2014-1959. (CVE-2009-5138)

Impact

A remote attacker may be able to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted Certificate Authority (CA) to issue new certificates.

Note: F5 Product Development has determined that BIG-IP, BIG-IQ, and Enterprise Manager versions ship with vulnerable GnuTLS code. However, the vulnerable code is not used as a server or to make outgoing connections, and is not exploitable.

For affected ARX systems, F5 recommends that you expose the management interface only on trusted networks.