Lucene search

K
rosalinuxROSA LABROSA-SA-2021-1847
HistoryJul 02, 2021 - 4:58 p.m.

Advisory ROSA-SA-2021-1847

2021-07-0216:58:09
ROSA LAB
abf.rosalinux.ru
10

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.3 High

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.02 Low

EPSS

Percentile

88.6%

Software: gnutls 3.3.29
OS: Cobalt 7.9

CVE-ID: CVE-2014-3469
CVE-Crit: CRITICAL
CVE-DESC: The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allow context-sensitive attackers to cause a denial of service (dereferencing a NULL pointer and crashing) via a NULL value in the ivalue argument.
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2014-3468
CVE-Crit: CRITICAL
CVE-DESC: The asn1_get_bit_der function in GNU Libtasn1 before version 3.6 incorrectly reports an error when a negative length in bits is defined, allowing context-sensitive attackers to invoke out-of-bounds access through created ASN.1 data.
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2014-3467
CVE-Crit: CRITICAL
CVE-DESC: Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 prior to 3.6, which was used in GnuTLS, allow remote attackers to cause a denial of service (read out of range) via generated ASN.1 data.
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2016-7444
CVE-Crit: HIGH
CVE-DESC: The gnutls_ocsp_resp_check_crt function in lib / x509 / ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not check the serial length of the OCSP response, which could allow remote attackers to bypass the intended certificate validation mechanism by using vectors that include completion bytes left by gnutls_malloc.
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2018-16868
CVE-Crit: MEDIUM
CVE-DESC: An oracle attack based on a Bleichenbacher-type side-channel was detected in the way gnutls handles the validation of PKCS # 1 v1.5 data decrypted with RSA. An attacker who could run a process on the same physical core as the victim process could use this to extract the plaintext or, in some cases, downgrade any TLS connections to the vulnerable server.
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2020-24659
CVE-Crit: HIGH
CVE-DESC: An issue was discovered in GnuTLS before 3.6.15. A server may initiate a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation warning is sent with an unexpected time and then an invalid second handshake occurs. The failure occurs in the application error handling path, where the gnutls_deinit function is called after a handshake failure is detected.
CVE-STATUS: default
CVE-REV: default

OSVersionArchitecturePackageVersionFilename
Cobaltanynoarchgnutls< 3.3.29UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.3 High

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.02 Low

EPSS

Percentile

88.6%