Lucene search

K
gentooGentoo FoundationGLSA-200505-04
HistoryMay 09, 2005 - 12:00 a.m.

GnuTLS: Denial of Service vulnerability

2005-05-0900:00:00
Gentoo Foundation
security.gentoo.org
8

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.027 Low

EPSS

Percentile

90.5%

Background

GnuTLS is a free TLS 1.0 and SSL 3.0 implementation for the GNU project.

Description

A vulnerability has been discovered in the record packet parsing in the GnuTLS library. Additionally, a flaw was also found in the RSA key export functionality.

Impact

A remote attacker could exploit this vulnerability and cause a Denial of Service to any application that utilizes the GnuTLS library.

Workaround

There is no known workaround at this time.

Resolution

All GnuTLS users should remove the existing installation and upgrade to the latest version:

 # emerge --sync
 # emerge --unmerge gnutls
 # emerge --ask --oneshot --verbose net-libs/gnutls

Due to small API changes with the previous version, please do the following to ensure your applications are using the latest GnuTLS that you just emerged.

 # revdep-rebuild --soname-regexp libgnutls.so.1[0-1]

Previously exported RSA keys can be fixed by executing the following command on the key files:

 # certtool -k infile outfile
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-libs/gnutls< 1.2.3UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.027 Low

EPSS

Percentile

90.5%