7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.4 High
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.01 Low
EPSS
Percentile
82.8%
A vulnerability was found in gnutls versions from 3.5.8 before 3.6.7. A memory corruption (double free) vulnerability in the certificate verification API. Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is affected.
lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
access.redhat.com/errata/RHSA-2019:3600
bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3829
gitlab.com/gnutls/gnutls/issues/694
lists.fedoraproject.org/archives/list/[email protected]/message/A3ETBUFBB4G7AITAOUYPGXVMBGVXKUAN/
lists.fedoraproject.org/archives/list/[email protected]/message/L7TJIBRJWGWSH6XIO2MXIQ3W6ES4R6I4/
lists.fedoraproject.org/archives/list/[email protected]/message/WRSOL66LHP4SD3Y2ECJDOGT4K663ECDU/
security.gentoo.org/glsa/201904-14
security.netapp.com/advisory/ntap-20190619-0004/
usn.ubuntu.com/3999-1/
www.gnutls.org/security-new.html
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.4 High
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.01 Low
EPSS
Percentile
82.8%